General

  • Target

    Chrome.apk

  • Size

    4.6MB

  • Sample

    230125-payp7she81

  • MD5

    bea9df0dc4a7cd1a1114e62421c813c7

  • SHA1

    dd598b5178be37846db2f68dfb8fb496cfd96914

  • SHA256

    fcf0edf3418c9fb60f2899e86035aef19060c391abc58b626afacd5f42db81c9

  • SHA512

    defddb84ff5520f8a69c59983ecb24579b68c40aaf3354269d3233e17ed63125a3ee982324bac1464ba6ea0fcb7cfd38f90375b81eaa6e90e9b7da49e6ec94a0

  • SSDEEP

    98304:tnr0WBTR7r0GLvBxKN2yn/dw0XiF1tjDquyibszsEVJvTyPg8iT:tr0W5Z00KpVatDqhiDEbvbLT

Malware Config

Extracted

Family

sova_v5

C2

aHR0cDovLzUuMTYxLjEyMC4yODo1MDAw

aHR0cDovL3lhbG5pc2dlemVuYWRhbWxhcmRhbmJpemhhYmVyLmNvLnZ1

Targets

    • Target

      Chrome.apk

    • Size

      4.6MB

    • MD5

      bea9df0dc4a7cd1a1114e62421c813c7

    • SHA1

      dd598b5178be37846db2f68dfb8fb496cfd96914

    • SHA256

      fcf0edf3418c9fb60f2899e86035aef19060c391abc58b626afacd5f42db81c9

    • SHA512

      defddb84ff5520f8a69c59983ecb24579b68c40aaf3354269d3233e17ed63125a3ee982324bac1464ba6ea0fcb7cfd38f90375b81eaa6e90e9b7da49e6ec94a0

    • SSDEEP

      98304:tnr0WBTR7r0GLvBxKN2yn/dw0XiF1tjDquyibszsEVJvTyPg8iT:tr0W5Z00KpVatDqhiDEbvbLT

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks