Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now
148
Global rank
131 infographic chevron month
Month rank
148 infographic chevron week
Week rank
0
IOCs

Octo malware, also known as ExobotCompact or Coper, is a sophisticated Android banking trojan that has evolved from earlier malware family Exobot. It poses a significant threat to financial institutions, mobile users, and enterprise networks.

Trojan
Type
Unknown
Origin
1 February, 2021
First seen
9 June, 2025
Last seen
Also known as
ExobotCompact
Coper

How to analyze Octo with ANY.RUN

Type
Unknown
Origin
1 February, 2021
First seen
9 June, 2025
Last seen

IOCs

Domains
call-recorder-ad77f-default-rtdb.firebaseio.com
cleaner-f40c4-default-rtdb.firebaseio.com
call-recorder-66f03-default-rtdb.firebaseio.com
universalsaverpro-default-rtdb.firebaseio.com
lucky-cleaner-default-rtdb.firebaseio.com
Last Seen at

Recent blog posts

post image
Simplify Threat Analysis and Boost Detection...
watchers 3523
comments 0
post image
Threat Hunting: Hands-on Tips for SOC Analyst...
watchers 569
comments 0
post image
Why Businesses Are at Risk of Android Malware...
watchers 465
comments 0

What is Octo malware?

Octo, also known as Coper or ExobotCompact, is an Android banking Trojan that evolved from the Exobot malware family, first observed in 2016. Initially based on the Marcher Trojan, Exobot targeted financial institutions globally until 2018, when a lighter version, ExobotCompact, emerged.

By 2021, a new variant appeared, named Coper by some antivirus vendors, but later renamed as Octo — a rebranded and enhanced ExobotCompact. In 2024, Octo2, an even more advanced iteration, was released, driven partly by the leak of Octo’s source code. The Malware-as-a-Service (MaaS) model makes Octo accessible to even novice cybercriminals.

Lineage:

  • Exobot, an Android banking trojan that went inactive, and its source code leaked.
  • ExobotCompact, a more compact version with no dependency on older Android APIs.
  • Octo, enhanced version with powerful remote access and evasion features.
  • Coper is sometimes considered a separate but related strain, circulating in Latin America, sharing infrastructure/code.

Octo’s Distribution

The malware targets Android devices through social engineering and malicious app distribution:

  • Fake Apps and Droppers: Octo disguises itself as legitimate apps like Google Chrome, NordVPN, or banking apps, often using a dropper service called Zombinder to bundle with legitimate APKs. These are typically distributed via third-party app stores, malicious websites, or phishing campaigns, though some droppers.
  • SMS Phishing (Smishing): Messages with malicious links trick users into downloading fake apps posing as WhatsApp, Netflix, or banking services. This functionality is similar to that of Salvador Stealer, another Android banking trojan.
  • Social Engineering: Campaigns often impersonate trusted brands or simulate urgent software updates. Regional targeting, such as fake Bancolombia apps for Colombian users, enhances credibility.

Once installed, Octo prompts users to enable Accessibility Services and give out Device Admin privileges, granting extensive control over the device, and enhances remote access stability.

Its communications with C2 servers include dynamic configurations to target specific apps (e.g., to block push notifications from banking apps).

Octo’s Key Operation Vectors

  • Keylogging: to capture credentials, PINs, and lock patterns. Data is temporarily stored in the device’s data directory before deletion to avoid detection.
  • Overlay Attacks: the trojan displays fake login screens or overlays mimicking banking apps to steal credentials and card details. Overlays adapt dynamically to the active app, increasing deception.
  • SMS and Notification Interception: Intercepts messages and push notifications, enabling attackers to bypass two-factor authentication (2FA).
  • Remote Access (VNC): Uses Android’s MediaProjection for near-real-time screen streaming (1 screenshot per second. Sends live feed to C2, allowing attackers to see everything that happens on the device.
  • Device Takeover: Can simulate clicks and actions in real-time.
  • Ransomware-Like Locking: Some variants (like Coper) can lock screens and demand ransom.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

Why Octo Is Especially Dangerous

  • Full Remote Control of Mobile Devices.
  • Live Monitoring and Fraud: Attackers perform fraud while victims are active, bypassing behavioral fraud detection.
  • Two-Factor Authentication Bypass: Through SMS or code-grabbing overlays.
  • Modular Structure: Can load updated components from C2 without user knowing.
  • Enterprise Risk: Can be used as an entry point into corporate networks via compromised employee devices (BYOD); targets banking customers and employees.

Octo’s Execution Process and Evasion Techniques

ANY.RUN’s Interactive Sandbox supports the analysis of APK files and enables the research of Android malware. Let us observe the behavior of an Octo sample where the malware is disguised as Google Chrome browser.

View Octo analysis session in the Sandbox

Once installed, Octo — also known as Coper or ExobotCompact — connects to its command and control (C2) server, potentially using a domain generation algorithm (DGA) to maintain resilient, encrypted communication. In our case, the address was toplamakampiyolculukhazirlik[.]xyz, visible in the DNS requests tab, though unresolved. The C2 provides configuration files and commands specifying which apps to target and what actions to take. In this task, the C2 was already offline.

Octo abuses Android’s Accessibility Service and MediaProjection APIs to gain full remote control, enabling real-time screen streaming, simulated taps, gestures, clipboard access, and text input. To stay hidden, it can display a black screen, dim brightness to zero, and disable notifications.

The malware supports keylogging, SMS and notification interception, blocking app alerts, screen locking/unlocking, muting sound, launching apps, and sending SMS. Attackers use AES-encrypted, Base64-encoded commands to control these features and perform on-device fraud—initiating and confirming transactions without triggering alarms.

Octo sample analysis in ANY.RUN Sandbox Octo mobile trojan analysis in ANY.RUN's Interactive Sandbox

Octo can also inject fake overlays to steal credentials and uninstall competing or security apps to maintain persistence and avoid detection.

This malware employs advanced methods to avoid detection. It requires no root access using Accessibility Services for control. Its small, modular codebase demonstrates a lightweight footprint helping to avoid detection by traditional antiviruses. Besides, obfuscation is applied, along with multi-layered code encryption, dynamic loading of malicious libraries. Continuous updates by developers and forks from the 2024 source code leak keep Octo ahead of traditional detection methods.

Expose malicious activities and get IOCs with ANY.RUN sandbox

  • Analyze malware in Windows 7, 10, and 11 VMs
  • Interact with files and links, just like on your own computer
  • Work in a private team space with your colleagues
Request 14-day free trial

What are the best-known Octo attacks?

While many campaigns are not publicly attributed due to the nature of mobile malware distribution, several have been documented by security vendors and researchers.

Year Campaign / Actor Region Method Targets
2022 Coper (Octo variant) Latin America Fake banking apps, smishing Colombian & Peruvian banks
2022 Octo advertised on dark web Global Malware-as-a-Service (MaaS) European banks
2022 Fake Chrome Update Global Smishing, fake update Generic users, credential theft
2022–23 Google Play fake apps Global Dropper apps Banking and crypto users

Gathering Threat Intelligence on Octo malware

Octo can be detected by such indicators as C2 domains, IPs, and unusual DNS traffic. Among the behavioral indicators, analysts should pay attention to background services that relaunch on boot, the use of Accessibility APIs, and unexpected overlays over banking apps. Its APK signatures include package names often mimicking known apps and typical permissions requests, like SYSTEM_ALERT_WINDOW, BIND_ACCESSIBILITY_SERVICE.

To start gathering actionable data via ANY.RUN's Threat Intelligence Lookup, search for the malware name and its aliases:

threatName:"octo" OR threatName:"exobot*"

Octo search in TI Lookup Add all of the Octo’s names to a single search request

Select and view analysis sessions to collect IOCs, IOBs, view processes, and study the malware’s TTPs to set up detection and response system, to develop prevention and mitigation strategies.

Octo’s malicious process in TI Lookup View malicious processes in detail

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

Octo malware (ExobotCompact / Coper) is one of the most advanced mobile threats in circulation, particularly dangerous because it provides real-time remote access and can bypass many layers of authentication and fraud detection. While it mainly targets banking users, its modularity and stealth make it a viable tool for cybercrime groups and potential APT-style attacks against enterprises. Countering Octo demands robust threat intelligence, proactive user education, and strict device security practices.

Start with 50 requests in TI Lookup to collect IOCs on the evolving Android malware

HAVE A LOOK AT

Stealer screenshot
Stealer
stealer
Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.
Read More
Phishing kit screenshot
Phishing kit
tycoon evilproxy sneaky2fa
Phishing kits are pre-packaged sets of malicious tools designed to make it easy for cybercriminals to launch phishing attacks. These kits replicate legitimate websites, steal credentials, and often include backend infrastructure for managing stolen data.
Read More
Tycoon 2FA screenshot
Tycoon 2FA
tycoon
Tycoon 2FA is a phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) protections, particularly targeting Microsoft 365 and Gmail accounts. Its advanced evasion techniques and modular architecture make it a significant threat to organizations relying on MFA for security.
Read More
Bumblebee Loader screenshot
Bumblebee Loader
bumblebee
Bumblebee is a highly adaptable malware loader, often used by threat actors linked to the Conti and TrickBot cybercrime groups. Since its discovery in 2021, Bumblebee has been leveraged in phishing campaigns and email thread hijacking, primarily to distribute payloads like Cobalt Strike and ransomware. The malware employs obfuscation techniques, such as DLL injection and virtual environment detection, to avoid detection and sandbox analysis. Its command-and-control infrastructure and anti-analysis features allow it to persist on infected devices, where it enables further payload downloads and system compromise.
Read More
Trojan screenshot
Trojan
trojan trojan horse
Trojans are a group of malicious programs distinguished by their ability to masquerade as benign software. Depending on their type, trojans possess a variety of capabilities, ranging from maintaining full remote control over the victim’s machine to stealing data and files, as well as dropping other malware. At the same time, the main functionality of each trojan family can differ significantly depending on its type. The most common trojan infection chain starts with a phishing email.
Read More
WarmCookie screenshot
WarmCookie
badspace
WarmCookie is a backdoor malware that cyber attackers use to gain initial access to targeted systems. It is often distributed through phishing emails, frequently using job recruitment lures to entice victims into downloading and executing the malware.
Read More