General
-
Target
a1417e93f789b5266f1af2cc1b693057904f574a0556a3ab99091976dbf54582
-
Size
9.6MB
-
Sample
250111-t283gatlfz
-
MD5
2392bb2fb40eeaee0e435838444c7092
-
SHA1
97ccdad81cb44e09000e957edb77622b5c6baced
-
SHA256
a1417e93f789b5266f1af2cc1b693057904f574a0556a3ab99091976dbf54582
-
SHA512
ff946a45a203134a1aa0903901854febe4ed3c3b407efdee1d159237e2d195b26555d0977e601a4b97e9ae5ce03e677ff6e7b686ced7917072c0a69af5445275
-
SSDEEP
98304:rnj5iSRGHW0RsAIS6IdeNe1PfnptWq4VKZXryt3Xc7VC:rnjrqRxISdgfU5k3XeVC
Static task
static1
Behavioral task
behavioral1
Sample
a1417e93f789b5266f1af2cc1b693057904f574a0556a3ab99091976dbf54582.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
a1417e93f789b5266f1af2cc1b693057904f574a0556a3ab99091976dbf54582
-
Size
9.6MB
-
MD5
2392bb2fb40eeaee0e435838444c7092
-
SHA1
97ccdad81cb44e09000e957edb77622b5c6baced
-
SHA256
a1417e93f789b5266f1af2cc1b693057904f574a0556a3ab99091976dbf54582
-
SHA512
ff946a45a203134a1aa0903901854febe4ed3c3b407efdee1d159237e2d195b26555d0977e601a4b97e9ae5ce03e677ff6e7b686ced7917072c0a69af5445275
-
SSDEEP
98304:rnj5iSRGHW0RsAIS6IdeNe1PfnptWq4VKZXryt3Xc7VC:rnjrqRxISdgfU5k3XeVC
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Checks Android system properties for emulator presence.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
3System Checks
3Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3