General
-
Target
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946
-
Size
8.7MB
-
Sample
241216-dvanbssrfk
-
MD5
34f2f1ca57fec362ec5ecff9632882d9
-
SHA1
084bc677dde1f2e4ca5b68cfbc3e000573d0a9d2
-
SHA256
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946
-
SHA512
bcb022f51b152688986a70aee5c56127ff6233d254cb33eb9034226088ea61f2283691b66b1fdec81aaaf0b16c71e9151ffa840983f68bd9459ff2b81e2e927a
-
SSDEEP
196608:okxcQ/tVmsqcwknnjWuIvPG2frzz/v5mloU0dpe4Ot:jxfjVqYnjuGKr3/sVuat
Static task
static1
Behavioral task
behavioral1
Sample
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
octo
https://6cbe12d804e423a2e6f3631799f16cb5.com
Targets
-
-
Target
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946
-
Size
8.7MB
-
MD5
34f2f1ca57fec362ec5ecff9632882d9
-
SHA1
084bc677dde1f2e4ca5b68cfbc3e000573d0a9d2
-
SHA256
0deb21fdba5fc32e6186bc6593f904490fdf65dbacb014077f1286f050a3b946
-
SHA512
bcb022f51b152688986a70aee5c56127ff6233d254cb33eb9034226088ea61f2283691b66b1fdec81aaaf0b16c71e9151ffa840983f68bd9459ff2b81e2e927a
-
SSDEEP
196608:okxcQ/tVmsqcwknnjWuIvPG2frzz/v5mloU0dpe4Ot:jxfjVqYnjuGKr3/sVuat
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
7.3MB
-
MD5
a091f3698e2e0e4258ec09b7499f82a2
-
SHA1
7b33bfa417bbd5c5848012f5ff15408df10fbd3b
-
SHA256
b34e33e934d4d37d9b062849b5234ca88b379f22a76f7102f14541edab8b9a0a
-
SHA512
95b0ba367f6675d9759ad71d3b3924a83b132132681e37dfaabc529b59199b0a932a5fc96c08e817719d04213c88d779fa49dc760581babf25875958b05fd755
-
SSDEEP
98304:1F7efW5iSRGkXRsaCithKj7uVKqW27fISJOX:1F7brlR2ckj7uUlYISJs
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4