General
-
Target
Chrome.apk
-
Size
4.6MB
-
Sample
230125-payp7she81
-
MD5
bea9df0dc4a7cd1a1114e62421c813c7
-
SHA1
dd598b5178be37846db2f68dfb8fb496cfd96914
-
SHA256
fcf0edf3418c9fb60f2899e86035aef19060c391abc58b626afacd5f42db81c9
-
SHA512
defddb84ff5520f8a69c59983ecb24579b68c40aaf3354269d3233e17ed63125a3ee982324bac1464ba6ea0fcb7cfd38f90375b81eaa6e90e9b7da49e6ec94a0
-
SSDEEP
98304:tnr0WBTR7r0GLvBxKN2yn/dw0XiF1tjDquyibszsEVJvTyPg8iT:tr0W5Z00KpVatDqhiDEbvbLT
Static task
static1
Behavioral task
behavioral1
Sample
Chrome.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Chrome.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Chrome.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
sova_v5
aHR0cDovLzUuMTYxLjEyMC4yODo1MDAw
aHR0cDovL3lhbG5pc2dlemVuYWRhbWxhcmRhbmJpemhhYmVyLmNvLnZ1
Targets
-
-
Target
Chrome.apk
-
Size
4.6MB
-
MD5
bea9df0dc4a7cd1a1114e62421c813c7
-
SHA1
dd598b5178be37846db2f68dfb8fb496cfd96914
-
SHA256
fcf0edf3418c9fb60f2899e86035aef19060c391abc58b626afacd5f42db81c9
-
SHA512
defddb84ff5520f8a69c59983ecb24579b68c40aaf3354269d3233e17ed63125a3ee982324bac1464ba6ea0fcb7cfd38f90375b81eaa6e90e9b7da49e6ec94a0
-
SSDEEP
98304:tnr0WBTR7r0GLvBxKN2yn/dw0XiF1tjDquyibszsEVJvTyPg8iT:tr0W5Z00KpVatDqhiDEbvbLT
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-