Analysis
-
max time kernel
3481444s -
max time network
141s -
platform
android_x64 -
resource
android-x64 -
submitted
10-09-2021 11:38
Static task
static1
Behavioral task
behavioral1
Sample
8a6889610a18296e812fabd0a4ceb8b75caadc5cec1b39e8173c3e0093fd3a57.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
8a6889610a18296e812fabd0a4ceb8b75caadc5cec1b39e8173c3e0093fd3a57.apk
-
Size
569KB
-
MD5
01b6f0220794476fe19a54c049600ab3
-
SHA1
eb9dfde47a393bca666e947f285f16c20baf6c32
-
SHA256
8a6889610a18296e812fabd0a4ceb8b75caadc5cec1b39e8173c3e0093fd3a57
-
SHA512
ac3031a6dbc5bb0d1e609979336487f14efe58f8e87480e5ef7f79c2abae56977ca444bbb5bbc7970d9c416f9c754b9fedf2bdef3b7b311c2e95e07350f9c892
Score
10/10
Malware Config
Signatures
-
Sova
Android banker first seen in July 2021.
-
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.adobe.flashplayer -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 api.ipify.org -
Uses reflection 6 IoCs
description pid Process Invokes method android.os.Handler.createAsync 3590 com.adobe.flashplayer Invokes method android.os.Handler.createAsync 3590 com.adobe.flashplayer Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE 3590 com.adobe.flashplayer Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3590 com.adobe.flashplayer Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3590 com.adobe.flashplayer Acesses field sun.misc.Unsafe.theUnsafe 3590 com.adobe.flashplayer