General

  • Target

    Aras_Kargo.apk

  • Size

    4.9MB

  • Sample

    230307-h4yhzage8y

  • MD5

    763392481eb7481b63f34271168821cb

  • SHA1

    d6fc3b5cc2e8a4964c4858fd515e9566e28aa29e

  • SHA256

    6f7e57ed7239905fafc3947160b5fc89ad615772d2a694299999d2fe080453f4

  • SHA512

    db372e0d80f99ef6466aba2f3f1a84f0d712195b2bf23eedce2318330072e4dea531e520d41540f7b3cdc3803f54bd3c24bc074163f78615e54808756534cdbe

  • SSDEEP

    98304:Av+dv9EEgB0Nbb3EX4cgY0RDNHApXnUdBtE6F428QdWET4CfhjCzOSr:AvC9AB0NvEXjMNHanMBtEM4cT4Cfoh

Malware Config

Extracted

Family

sova_v5

C2

aHR0cDovL2Fha3NkazEyNTEyLm5ldDo1MDAw

aHR0cDovL2Fha3NkazEyNTEyZ3MubmV0OjUwMDA\u003d

aHR0cDovL2FhYXNrc2FzZmRrMTI1YXNmMTIubmV0OjUwMDA\u003d

aHR0cDovL2Fhc2Zha3NkMjRrMTI1MTIubmV0OjUwMDA\u003d

aHR0cDovL2FhYWtzZGFzZmFrMTI1MTIubmV0OjUwMDA\u003d

Targets

    • Target

      Aras_Kargo.apk

    • Size

      4.9MB

    • MD5

      763392481eb7481b63f34271168821cb

    • SHA1

      d6fc3b5cc2e8a4964c4858fd515e9566e28aa29e

    • SHA256

      6f7e57ed7239905fafc3947160b5fc89ad615772d2a694299999d2fe080453f4

    • SHA512

      db372e0d80f99ef6466aba2f3f1a84f0d712195b2bf23eedce2318330072e4dea531e520d41540f7b3cdc3803f54bd3c24bc074163f78615e54808756534cdbe

    • SSDEEP

      98304:Av+dv9EEgB0Nbb3EX4cgY0RDNHApXnUdBtE6F428QdWET4CfhjCzOSr:AvC9AB0NvEXjMNHanMBtEM4cT4Cfoh

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks