General
-
Target
693651f17874a3de1dd86b937351ad23991cc8c9e2fdb0a838958da522cc003c
-
Size
7.3MB
-
Sample
241201-1w1bpsyneq
-
MD5
45c4732acf509ab14c735f04e7fd78d7
-
SHA1
1cb284b1e7721c2aef6bd201c267869aaa99e963
-
SHA256
693651f17874a3de1dd86b937351ad23991cc8c9e2fdb0a838958da522cc003c
-
SHA512
7b9a8dadb1fd0df6f15470592a425a6d79921a62c226e1964bb9580141c8cfed0459d224ab30ca3a978cb2a2ce6c8573f32731aff7b234581bfc2f49497ac3e4
-
SSDEEP
98304:0AZ335iSRGOpVKCnSeNe+P5y3XHRsmyAemdpjW:0AZ33rhUgPQ3XHRjTQ
Static task
static1
Behavioral task
behavioral1
Sample
693651f17874a3de1dd86b937351ad23991cc8c9e2fdb0a838958da522cc003c.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
693651f17874a3de1dd86b937351ad23991cc8c9e2fdb0a838958da522cc003c
-
Size
7.3MB
-
MD5
45c4732acf509ab14c735f04e7fd78d7
-
SHA1
1cb284b1e7721c2aef6bd201c267869aaa99e963
-
SHA256
693651f17874a3de1dd86b937351ad23991cc8c9e2fdb0a838958da522cc003c
-
SHA512
7b9a8dadb1fd0df6f15470592a425a6d79921a62c226e1964bb9580141c8cfed0459d224ab30ca3a978cb2a2ce6c8573f32731aff7b234581bfc2f49497ac3e4
-
SSDEEP
98304:0AZ335iSRGOpVKCnSeNe+P5y3XHRsmyAemdpjW:0AZ33rhUgPQ3XHRjTQ
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4