General
-
Target
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3 (1).apk
-
Size
6.8MB
-
Sample
221006-t3rjtaabhq
-
MD5
b1101bb941285fc54a21c271ee7bf60e
-
SHA1
e883525faf27f91493f17a657577289be038cd64
-
SHA256
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3
-
SHA512
c6368129febea4c32145c3f941590afdea9370ceb4ea10d7920125da8807bd733cc27b70d248750afffad832012a5bc2131e08717af1e89a30d1a74539efe881
-
SSDEEP
196608:1afUNP3J+obzYV6zNRxxdXBoWu3FGw0IMweI5Q/Dt7Xo3Ub:gcNvJ+LwRPxdxoNAw0IMCU78Ub
Static task
static1
Behavioral task
behavioral1
Sample
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3 (1).apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3 (1).apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3 (1).apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3 (1).apk
-
Size
6.8MB
-
MD5
b1101bb941285fc54a21c271ee7bf60e
-
SHA1
e883525faf27f91493f17a657577289be038cd64
-
SHA256
b2e592c5cf8ccc944c06a11ff156efdfa4233fe46e2281bab3fd238f03b505e3
-
SHA512
c6368129febea4c32145c3f941590afdea9370ceb4ea10d7920125da8807bd733cc27b70d248750afffad832012a5bc2131e08717af1e89a30d1a74539efe881
-
SSDEEP
196608:1afUNP3J+obzYV6zNRxxdXBoWu3FGw0IMweI5Q/Dt7Xo3Ub:gcNvJ+LwRPxdxoNAw0IMCU78Ub
Score10/10-
SOVA_v3 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-