General
-
Target
Chrome (2).apk
-
Size
4.7MB
-
Sample
230307-v39wtsad7t
-
MD5
4b0e93354da17984f0bef68b9ab83380
-
SHA1
bff351735b6153339cc8d52089495db0533392b3
-
SHA256
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa
-
SHA512
7353933b7919a87feae7345a09eb2e90bfa32723ae5a0df0d879ca29f0184ce799d1ed625564fc1d095154567618b8d4b79a6fadc0e1b669bafbfde9d6ff9933
-
SSDEEP
98304:pza2GxDDbL6zkfwe+0F3hoiLUpbcqon9BsTBAx5r3LyNXvOwxHMRA2QAFZ:pzMxDDbL6ew6Ro6Szo9BCBAxs8wtkA2f
Static task
static1
Behavioral task
behavioral1
Sample
Chrome (2).apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Chrome (2).apk
Resource
android-x64-20220823-en
Malware Config
Extracted
sova_v5
aHR0cDovL25leHN1c2xhemltLm5ldDo1MDAw
aHR0cDovLzUuMTYxLjIzLjEyMjo1MDAw
aHR0cDovL25leHN1c2xhemltMS5uZXQ6NTAwMA\u003d\u003d
Targets
-
-
Target
Chrome (2).apk
-
Size
4.7MB
-
MD5
4b0e93354da17984f0bef68b9ab83380
-
SHA1
bff351735b6153339cc8d52089495db0533392b3
-
SHA256
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa
-
SHA512
7353933b7919a87feae7345a09eb2e90bfa32723ae5a0df0d879ca29f0184ce799d1ed625564fc1d095154567618b8d4b79a6fadc0e1b669bafbfde9d6ff9933
-
SSDEEP
98304:pza2GxDDbL6zkfwe+0F3hoiLUpbcqon9BsTBAx5r3LyNXvOwxHMRA2QAFZ:pzMxDDbL6ew6Ro6Szo9BCBAxs8wtkA2f
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-