General
-
Target
7a7f42d28d65a10f934af656bc714c8b6d0a02c1f6cb1374c272b83cc71caacf
-
Size
7.3MB
-
Sample
250111-t1w2hswlhn
-
MD5
aa591286f90c59932abee9fc9930f66e
-
SHA1
58f4bdb75a0215669325cd574e428ebe2b3d1602
-
SHA256
7a7f42d28d65a10f934af656bc714c8b6d0a02c1f6cb1374c272b83cc71caacf
-
SHA512
3b6e73606351451e7f7361f3918d83704ebda0e6b4335509907f9107e5938237a82c291a9fa3b8a7d0bd3e1ef609bb6e5c79d966126b8819f94f614c89538957
-
SSDEEP
98304:I6R80wrSHf27iE3XHVKl55iSRGFC9sFh8gmq5Rs/0:Ig80RO7V3XHUnrN9sFh8gmq5RT
Static task
static1
Behavioral task
behavioral1
Sample
7a7f42d28d65a10f934af656bc714c8b6d0a02c1f6cb1374c272b83cc71caacf.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
7a7f42d28d65a10f934af656bc714c8b6d0a02c1f6cb1374c272b83cc71caacf
-
Size
7.3MB
-
MD5
aa591286f90c59932abee9fc9930f66e
-
SHA1
58f4bdb75a0215669325cd574e428ebe2b3d1602
-
SHA256
7a7f42d28d65a10f934af656bc714c8b6d0a02c1f6cb1374c272b83cc71caacf
-
SHA512
3b6e73606351451e7f7361f3918d83704ebda0e6b4335509907f9107e5938237a82c291a9fa3b8a7d0bd3e1ef609bb6e5c79d966126b8819f94f614c89538957
-
SSDEEP
98304:I6R80wrSHf27iE3XHVKl55iSRGFC9sFh8gmq5Rs/0:Ig80RO7V3XHUnrN9sFh8gmq5RT
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4