General
-
Target
file
-
Size
8.1MB
-
Sample
250121-gvj4jszmcn
-
MD5
7216713f42d7a1a66ff014070b5f8778
-
SHA1
40117df4a0b1114bf9152ae65bfdb5e3702b32b9
-
SHA256
77f328c158d095d36ca1b1c0b2aea943bb484b46133ee2886732b8343ab99d7a
-
SHA512
b5b5594b3d13a60231ffd828d0b2509befe341eee2e7300293be2729d368cef650284ce68e08d78311480f234f9a53efdbf53b4448bcb3d7dede92bbdfce046d
-
SSDEEP
196608:Afx3X0RvrTUwFpVL28fV4ap3Zt99UKGP/AQ:AIrT/FpVVaaU
Static task
static1
Behavioral task
behavioral1
Sample
file.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
octo
Targets
-
-
Target
file
-
Size
8.1MB
-
MD5
7216713f42d7a1a66ff014070b5f8778
-
SHA1
40117df4a0b1114bf9152ae65bfdb5e3702b32b9
-
SHA256
77f328c158d095d36ca1b1c0b2aea943bb484b46133ee2886732b8343ab99d7a
-
SHA512
b5b5594b3d13a60231ffd828d0b2509befe341eee2e7300293be2729d368cef650284ce68e08d78311480f234f9a53efdbf53b4448bcb3d7dede92bbdfce046d
-
SSDEEP
196608:Afx3X0RvrTUwFpVL28fV4ap3Zt99UKGP/AQ:AIrT/FpVVaaU
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4