General
-
Target
63f614836a7a8c1b77461646f1818512b1d72e43a8a39f5ba853e8132e01eeb7
-
Size
8.7MB
-
Sample
241201-1nsa5ayjgn
-
MD5
7f1311cf48e0c858f4aaa62ecf9d4b5c
-
SHA1
547c9a4108dd5f84e610589cecf6f5d21f22172c
-
SHA256
63f614836a7a8c1b77461646f1818512b1d72e43a8a39f5ba853e8132e01eeb7
-
SHA512
63eb3345083e9f3a87853bd936f87cf4a177d32aadad8702ffcf28ab5e28215ed879b8d4d4c8d1c771d3b465b4703bb1dec2c9fd03b7e888cfb1c954448abe9b
-
SSDEEP
98304:R0mISrQZbMhbULwKb4X9u4kfV5iSRGJyuIPBIoRsNrwXj7QVKtLiVJBkMhamTi7r:R/vuntrlRMrQj7QUt0DTi7nr
Static task
static1
Behavioral task
behavioral1
Sample
63f614836a7a8c1b77461646f1818512b1d72e43a8a39f5ba853e8132e01eeb7.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
63f614836a7a8c1b77461646f1818512b1d72e43a8a39f5ba853e8132e01eeb7
-
Size
8.7MB
-
MD5
7f1311cf48e0c858f4aaa62ecf9d4b5c
-
SHA1
547c9a4108dd5f84e610589cecf6f5d21f22172c
-
SHA256
63f614836a7a8c1b77461646f1818512b1d72e43a8a39f5ba853e8132e01eeb7
-
SHA512
63eb3345083e9f3a87853bd936f87cf4a177d32aadad8702ffcf28ab5e28215ed879b8d4d4c8d1c771d3b465b4703bb1dec2c9fd03b7e888cfb1c954448abe9b
-
SSDEEP
98304:R0mISrQZbMhbULwKb4X9u4kfV5iSRGJyuIPBIoRsNrwXj7QVKtLiVJBkMhamTi7r:R/vuntrlRMrQj7QUt0DTi7nr
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4