General
-
Target
02a7b6c674daf7257c2ea95e4f5a96f675febb4a53f5e29c7ccbf5fe2dc3f81b
-
Size
9.7MB
-
Sample
241216-dgrppa1jfv
-
MD5
6c40d0ce4ba4c7b795b7241d07941af9
-
SHA1
7802246571b7ee84a0b50724f4846e8ef5efdd98
-
SHA256
02a7b6c674daf7257c2ea95e4f5a96f675febb4a53f5e29c7ccbf5fe2dc3f81b
-
SHA512
6629d7a851fbb8bca27127223a44ae0e7094260efb527e6affdcc0ba79632491f21e98662491441275e202f3e4701044b5c072cbf6cd8ae164361d4aeebb3c03
-
SSDEEP
196608:pEz5iAMm3qMslK6Q3fyPx1OjMSbxRa0VHcTc9cqQpMe8BJBojA9:pENS/MsvQ3faxMFbG0GTEconBJB9
Static task
static1
Behavioral task
behavioral1
Sample
02a7b6c674daf7257c2ea95e4f5a96f675febb4a53f5e29c7ccbf5fe2dc3f81b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
02a7b6c674daf7257c2ea95e4f5a96f675febb4a53f5e29c7ccbf5fe2dc3f81b
-
Size
9.7MB
-
MD5
6c40d0ce4ba4c7b795b7241d07941af9
-
SHA1
7802246571b7ee84a0b50724f4846e8ef5efdd98
-
SHA256
02a7b6c674daf7257c2ea95e4f5a96f675febb4a53f5e29c7ccbf5fe2dc3f81b
-
SHA512
6629d7a851fbb8bca27127223a44ae0e7094260efb527e6affdcc0ba79632491f21e98662491441275e202f3e4701044b5c072cbf6cd8ae164361d4aeebb3c03
-
SSDEEP
196608:pEz5iAMm3qMslK6Q3fyPx1OjMSbxRa0VHcTc9cqQpMe8BJBojA9:pENS/MsvQ3faxMFbG0GTEconBJB9
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
8.4MB
-
MD5
fb1ba100e4f57daec89c73b22233d569
-
SHA1
a42efe6a797ec95c815f3822d1e4ec16306df6af
-
SHA256
c5ab9a0327ac718c196f0fb3709fd6fbeaad327bb5bf1685174f54acbeb79dcf
-
SHA512
e3a07f378c76628eb8c103f154264b023c48530ae36d8c13faa0995581ea2605540e315496ae4c0898a11e7f24ea5aa25a5c63371e411ffdd0a0ad92aac8088e
-
SSDEEP
98304:W3G/AJgoTVK2i0aj7+5iSRGAkRsgMj3j1dc961b0mH5Zn:MGAJgoTUV5j7+r+Rxy3T66175
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4