General
-
Target
Aras_Kargo.apk
-
Size
4.9MB
-
Sample
230307-h4yhzage8y
-
MD5
763392481eb7481b63f34271168821cb
-
SHA1
d6fc3b5cc2e8a4964c4858fd515e9566e28aa29e
-
SHA256
6f7e57ed7239905fafc3947160b5fc89ad615772d2a694299999d2fe080453f4
-
SHA512
db372e0d80f99ef6466aba2f3f1a84f0d712195b2bf23eedce2318330072e4dea531e520d41540f7b3cdc3803f54bd3c24bc074163f78615e54808756534cdbe
-
SSDEEP
98304:Av+dv9EEgB0Nbb3EX4cgY0RDNHApXnUdBtE6F428QdWET4CfhjCzOSr:AvC9AB0NvEXjMNHanMBtEM4cT4Cfoh
Static task
static1
Behavioral task
behavioral1
Sample
Aras_Kargo.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Aras_Kargo.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
Aras_Kargo.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
sova_v5
aHR0cDovL2Fha3NkazEyNTEyLm5ldDo1MDAw
aHR0cDovL2Fha3NkazEyNTEyZ3MubmV0OjUwMDA\u003d
aHR0cDovL2FhYXNrc2FzZmRrMTI1YXNmMTIubmV0OjUwMDA\u003d
aHR0cDovL2Fhc2Zha3NkMjRrMTI1MTIubmV0OjUwMDA\u003d
aHR0cDovL2FhYWtzZGFzZmFrMTI1MTIubmV0OjUwMDA\u003d
Targets
-
-
Target
Aras_Kargo.apk
-
Size
4.9MB
-
MD5
763392481eb7481b63f34271168821cb
-
SHA1
d6fc3b5cc2e8a4964c4858fd515e9566e28aa29e
-
SHA256
6f7e57ed7239905fafc3947160b5fc89ad615772d2a694299999d2fe080453f4
-
SHA512
db372e0d80f99ef6466aba2f3f1a84f0d712195b2bf23eedce2318330072e4dea531e520d41540f7b3cdc3803f54bd3c24bc074163f78615e54808756534cdbe
-
SSDEEP
98304:Av+dv9EEgB0Nbb3EX4cgY0RDNHApXnUdBtE6F428QdWET4CfhjCzOSr:AvC9AB0NvEXjMNHanMBtEM4cT4Cfoh
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-