Analysis
-
max time kernel
3433836s -
max time network
141s -
platform
android_x64 -
resource
android-x64 -
submitted
09-09-2021 22:25
Static task
static1
Behavioral task
behavioral1
Sample
efb92fb17348eb10ba3a93ab004422c30bcf8ae72f302872e9ef3263c47133a7.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
efb92fb17348eb10ba3a93ab004422c30bcf8ae72f302872e9ef3263c47133a7.apk
-
Size
2.9MB
-
MD5
03f51334546586d0b56ee81d3df9fd7a
-
SHA1
b45ff7ff0126a88d6782d6871c472577cb7b103c
-
SHA256
efb92fb17348eb10ba3a93ab004422c30bcf8ae72f302872e9ef3263c47133a7
-
SHA512
0024bdc9185322613bf2e081702dbeceb3efd0ba9168860ec7572890d5135cb77182923f917dccc4fbffb09a38ebc92c4f2ff527f53cbfdf29e595d77e3608d9
Score
10/10
Malware Config
Signatures
-
Sova
Android banker first seen in July 2021.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.sigki.ckmelxlbecx/code_cache/secondary-dexes/base.apk.classes1.zip 3595 com.sigki.ckmelxlbecx -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.sigki.ckmelxlbecx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 api.ipify.org -
Uses reflection 6 IoCs
description pid Process Invokes method android.os.Handler.createAsync 3595 com.sigki.ckmelxlbecx Invokes method android.os.Handler.createAsync 3595 com.sigki.ckmelxlbecx Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE 3595 com.sigki.ckmelxlbecx Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3595 com.sigki.ckmelxlbecx Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3595 com.sigki.ckmelxlbecx Acesses field sun.misc.Unsafe.theUnsafe 3595 com.sigki.ckmelxlbecx