Analysis
-
max time kernel
3481380s -
max time network
41s -
platform
android_x64 -
resource
android-x64 -
submitted
10-09-2021 11:39
Static task
static1
Behavioral task
behavioral1
Sample
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk
Resource
android-x64
android_x64
0 signatures
0 seconds
General
-
Target
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165.apk
-
Size
2.9MB
-
MD5
1698651d6b8fd95574f62b046b4f68e5
-
SHA1
ed0558bbfd7929cb4a28d6b095f68f26fcea4370
-
SHA256
dd8a5a1a8632d661f152f435b7afba825e474ec0d03d1c5ef8669fdc2b484165
-
SHA512
74d932cda56d661ade9dbf4ebcb0c092bee262a5475eded9b98010d00a97cbb6dc2083948e6ca568b238c1a801e52f096df35daa76160bfa8683bab41eb046a9
Score
10/10
Malware Config
Signatures
-
Sova
Android banker first seen in July 2021.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.clqg.sbtkqsb.ixrooga/code_cache/secondary-dexes/base.apk.classes1.zip 3673 com.clqg.sbtkqsb.ixrooga -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS com.clqg.sbtkqsb.ixrooga -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 api.ipify.org -
Uses reflection 7 IoCs
description pid Process Acesses field com.android.okhttp.internal.tls.OkHostnameVerifier.INSTANCE 3673 com.clqg.sbtkqsb.ixrooga Invokes method android.os.Handler.createAsync 3673 com.clqg.sbtkqsb.ixrooga Invokes method android.os.Handler.createAsync 3673 com.clqg.sbtkqsb.ixrooga Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3673 com.clqg.sbtkqsb.ixrooga Acesses field javax.security.auth.x500.X500Principal.thisX500Name 3673 com.clqg.sbtkqsb.ixrooga Acesses field sun.misc.Unsafe.theUnsafe 3673 com.clqg.sbtkqsb.ixrooga Acesses field sun.misc.Unsafe.theUnsafe 3673 com.clqg.sbtkqsb.ixrooga