General

  • Target

    Chrome (3).apk

  • Size

    4.7MB

  • Sample

    230307-v4vtasba75

  • MD5

    3fe3fa5fbebcf71367586d6d2a3824f9

  • SHA1

    900122232d087a1b189168096798ef40a94ac442

  • SHA256

    15eae9134dac9268cbf005c23299c88dd5c5176a240201da751691a543375360

  • SHA512

    e2e847e6a99a7e106429024d52b2898346f7bdd2d42d4ab815300fd4aa6448532ebd5e72e637bcc843f367d491c421f3144a1d8630fd9e0547a2b3f56d6144dd

  • SSDEEP

    98304:RWY/5eMi8wI0KAho87G0hsdQi3UGcJxuEfBAK7KSN1hwV:RW4e98VioNDdQi39cPrfBFKSNcV

Malware Config

Targets

    • Target

      Chrome (3).apk

    • Size

      4.7MB

    • MD5

      3fe3fa5fbebcf71367586d6d2a3824f9

    • SHA1

      900122232d087a1b189168096798ef40a94ac442

    • SHA256

      15eae9134dac9268cbf005c23299c88dd5c5176a240201da751691a543375360

    • SHA512

      e2e847e6a99a7e106429024d52b2898346f7bdd2d42d4ab815300fd4aa6448532ebd5e72e637bcc843f367d491c421f3144a1d8630fd9e0547a2b3f56d6144dd

    • SSDEEP

      98304:RWY/5eMi8wI0KAho87G0hsdQi3UGcJxuEfBAK7KSN1hwV:RW4e98VioNDdQi39cPrfBFKSNcV

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks