General
-
Target
5ba71e64d182319471a8a727af92f473628136682315e430dd5061bbea11d070
-
Size
7.5MB
-
Sample
241216-enmjzstjht
-
MD5
9b69cee561196cefc709d453a7211e41
-
SHA1
92889ede639b3b532a96e187880b02bd4ee2b304
-
SHA256
5ba71e64d182319471a8a727af92f473628136682315e430dd5061bbea11d070
-
SHA512
f02d45eeb75d3eccd9d849dcf4b744f6a2aef122658a4b426e213f6ad3553da54a1aeddbead277b0de320544cfe10df99db6ba96dd701d04ba04be8fa0c07525
-
SSDEEP
196608:TYFDACgLMtclqXP9dC9DZDGOSUr6i080blAGe:aDACyfwP9dC9DZCIuLuN
Static task
static1
Behavioral task
behavioral1
Sample
5ba71e64d182319471a8a727af92f473628136682315e430dd5061bbea11d070.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
base.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
https://biribizidurdursun310.xyz/NTQzZmI0YTdmMjNl/
https://biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://3biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://4biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun361.net/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun536.com/NTQzZmI0YTdmMjNl/
Extracted
octo
https://biribizidurdursun310.xyz/NTQzZmI0YTdmMjNl/
https://biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://3biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://4biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun36.xyz/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun361.net/NTQzZmI0YTdmMjNl/
https://5biribizidurdursun536.com/NTQzZmI0YTdmMjNl/
Targets
-
-
Target
5ba71e64d182319471a8a727af92f473628136682315e430dd5061bbea11d070
-
Size
7.5MB
-
MD5
9b69cee561196cefc709d453a7211e41
-
SHA1
92889ede639b3b532a96e187880b02bd4ee2b304
-
SHA256
5ba71e64d182319471a8a727af92f473628136682315e430dd5061bbea11d070
-
SHA512
f02d45eeb75d3eccd9d849dcf4b744f6a2aef122658a4b426e213f6ad3553da54a1aeddbead277b0de320544cfe10df99db6ba96dd701d04ba04be8fa0c07525
-
SSDEEP
196608:TYFDACgLMtclqXP9dC9DZDGOSUr6i080blAGe:aDACyfwP9dC9DZCIuLuN
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
3.5MB
-
MD5
42305a4586640e91c21dd72bdff55bb5
-
SHA1
c462208e1117e88e41d5e4d71509f0ffaf6ed6df
-
SHA256
370c44d79a503fcfc41060a6cc567d1e93c419c41fc04b8169516204578b96e7
-
SHA512
ca2cdb1087ca6d53c3a0b669fa28534411e9d054d8a659ccb90e37450435430dce928a51da716888fe1994cb4599df8ff9094d6be13bb7ba1564d19692863666
-
SSDEEP
98304:gukWXLjQGrAmA9tnkgjOfd8kWG89oiEKQqBNvxjTPPJ:F8I3WGcoNKQIPJ
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Credential Access
Access Notifications
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
3