General
-
Target
67f5d79aae9a93c75007f2b5c6edc11a15fa2cdcc2725aa54e728d222bfd733c
-
Size
4.8MB
-
Sample
241201-1pp76atkbt
-
MD5
8e2478f82e2e437befee77e09e7c3834
-
SHA1
c85169d7add587f99a8c5af764f42c493cc428c4
-
SHA256
67f5d79aae9a93c75007f2b5c6edc11a15fa2cdcc2725aa54e728d222bfd733c
-
SHA512
340c9b3adefd3647743101fc5767638dfd84ae7a539eb343b3bfdbe19bb02495af6fd3ed77ed4fe87986dbfe4e0d28724aeb981398f7ac360436d8ac0537cf00
-
SSDEEP
49152:qRsEXGN1ZU5Ku0j7X45iS7xrGY/N866qjVKScLD7lOUfO34hbr/vL3oH:qRsH7U570j7I5iSRGjUVKV9S3ybzi
Static task
static1
Behavioral task
behavioral1
Sample
67f5d79aae9a93c75007f2b5c6edc11a15fa2cdcc2725aa54e728d222bfd733c.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
67f5d79aae9a93c75007f2b5c6edc11a15fa2cdcc2725aa54e728d222bfd733c
-
Size
4.8MB
-
MD5
8e2478f82e2e437befee77e09e7c3834
-
SHA1
c85169d7add587f99a8c5af764f42c493cc428c4
-
SHA256
67f5d79aae9a93c75007f2b5c6edc11a15fa2cdcc2725aa54e728d222bfd733c
-
SHA512
340c9b3adefd3647743101fc5767638dfd84ae7a539eb343b3bfdbe19bb02495af6fd3ed77ed4fe87986dbfe4e0d28724aeb981398f7ac360436d8ac0537cf00
-
SSDEEP
49152:qRsEXGN1ZU5Ku0j7X45iS7xrGY/N866qjVKScLD7lOUfO34hbr/vL3oH:qRsH7U570j7I5iSRGjUVKV9S3ybzi
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4