General
-
Target
a07ff33cbab6fe694a172b8b50993621b06a8ced096d41b20c872cdd3dee6891
-
Size
8.7MB
-
Sample
250111-tv6nrswkbr
-
MD5
fbac3698eda03719feb4535262a6ad14
-
SHA1
0b297b4b4c8396077210bb718c8dddaa0bf1d50f
-
SHA256
a07ff33cbab6fe694a172b8b50993621b06a8ced096d41b20c872cdd3dee6891
-
SHA512
0c1b52567532cab0c9b3ea29d851dec8f610d3194eb4c33f3c00b2b5d044a722c9370be6463499940fbddd226a025f380596ba1b49616a23595e5b3e7f7d6f69
-
SSDEEP
98304:9hbOGN1jp5XXoRcjVRsRGLrShv5iSRG93qzYj7SVK8b+F:XxpdXoqJRihvrmq0j7SUr
Static task
static1
Behavioral task
behavioral1
Sample
a07ff33cbab6fe694a172b8b50993621b06a8ced096d41b20c872cdd3dee6891.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
a07ff33cbab6fe694a172b8b50993621b06a8ced096d41b20c872cdd3dee6891
-
Size
8.7MB
-
MD5
fbac3698eda03719feb4535262a6ad14
-
SHA1
0b297b4b4c8396077210bb718c8dddaa0bf1d50f
-
SHA256
a07ff33cbab6fe694a172b8b50993621b06a8ced096d41b20c872cdd3dee6891
-
SHA512
0c1b52567532cab0c9b3ea29d851dec8f610d3194eb4c33f3c00b2b5d044a722c9370be6463499940fbddd226a025f380596ba1b49616a23595e5b3e7f7d6f69
-
SSDEEP
98304:9hbOGN1jp5XXoRcjVRsRGLrShv5iSRG93qzYj7SVK8b+F:XxpdXoqJRihvrmq0j7SUr
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3