General
-
Target
fa7548427475a19fdefa37d6269c472996539edbb28061e94093e3dc93b3041f
-
Size
4.8MB
-
Sample
241216-dcqltszqfw
-
MD5
e9d4dbd570e3cfd3b0f1d48567199235
-
SHA1
ef85e495306b9bead8900e98021dee765e867c6a
-
SHA256
fa7548427475a19fdefa37d6269c472996539edbb28061e94093e3dc93b3041f
-
SHA512
d3d4576a6856f16efcf26bf4cfe1a61ca2789e07c225e52cdeed1b35c8279d307e513472e6677fe8b99991f0f4ffc1668e6a9b8422aa0538bbd3fb8d648d9ba0
-
SSDEEP
49152:8RsEXDVAAKqI3XxP45iS7xrGdrp6eNmjVKScM2EbKCY9ObkTvrlSj0Q:8RsOPDI3XO5iSRGJQVKu49O6I
Static task
static1
Behavioral task
behavioral1
Sample
fa7548427475a19fdefa37d6269c472996539edbb28061e94093e3dc93b3041f.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
fa7548427475a19fdefa37d6269c472996539edbb28061e94093e3dc93b3041f
-
Size
4.8MB
-
MD5
e9d4dbd570e3cfd3b0f1d48567199235
-
SHA1
ef85e495306b9bead8900e98021dee765e867c6a
-
SHA256
fa7548427475a19fdefa37d6269c472996539edbb28061e94093e3dc93b3041f
-
SHA512
d3d4576a6856f16efcf26bf4cfe1a61ca2789e07c225e52cdeed1b35c8279d307e513472e6677fe8b99991f0f4ffc1668e6a9b8422aa0538bbd3fb8d648d9ba0
-
SSDEEP
49152:8RsEXDVAAKqI3XxP45iS7xrGdrp6eNmjVKScM2EbKCY9ObkTvrlSj0Q:8RsOPDI3XO5iSRGJQVKu49O6I
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4