General
-
Target
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa
-
Size
6.5MB
-
Sample
250409-ljfzzawyez
-
MD5
fbd8d85760dab75c3b39a430e2ea8e5b
-
SHA1
aa4ca473c7ba07925a177b3e9839ecda59c4f0b0
-
SHA256
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa
-
SHA512
2dbb1cee0648056e01378ba520f278131e402d1e829e050c3ab60d5cc38ef501ee08924cf8f8ce75915d268a8f2fe83b0c224c332dcbbc34535061a299bb872f
-
SSDEEP
98304:qjBXE/2g5iSRGexRso+VKrug53XZxLZiMv5KpgK3bTK:5+gr9R8Ui23XZxLZ1luK
Static task
static1
Behavioral task
behavioral1
Sample
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa
-
Size
6.5MB
-
MD5
fbd8d85760dab75c3b39a430e2ea8e5b
-
SHA1
aa4ca473c7ba07925a177b3e9839ecda59c4f0b0
-
SHA256
d6dc77858e5d37cb36b5c6b088a1fde81933b2a405555c7808aae64ef4708dfa
-
SHA512
2dbb1cee0648056e01378ba520f278131e402d1e829e050c3ab60d5cc38ef501ee08924cf8f8ce75915d268a8f2fe83b0c224c332dcbbc34535061a299bb872f
-
SSDEEP
98304:qjBXE/2g5iSRGexRso+VKrug53XZxLZiMv5KpgK3bTK:5+gr9R8Ui23XZxLZ1luK
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests enabling of the accessibility settings.
-
MITRE ATT&CK Mobile v16
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Discovery
Software Discovery
1Security Software Discovery
1System Network Configuration Discovery
4