General

  • Target

    3fe3fa5fbebcf71367586d6d2a3824f9.bin

  • Size

    4.4MB

  • Sample

    230309-bk6xnshh85

  • MD5

    7b5a156a417d14e686306c672e71433b

  • SHA1

    7fcc592813d8b4645c919e0a8a5ec83279b31fb8

  • SHA256

    b76cb30c0c15e840e67e826f786ccbd9e74351b7c5100b5b760528b32fb77cff

  • SHA512

    4e8fe8b7407ef5c6102c3366504fb1a0a3bbce8acc5c5e763ecde0407fc0903b86b6e21844e4598558c7da9319cc8737ebdce6646096bc570dc46d1a15a46f2d

  • SSDEEP

    98304:H+5ExftwAC7QgRTRSSS8eh4f9B4dpBh3sBx/NzjnD:H+O7gBEL+z4dprm/J

Malware Config

Extracted

Family

sova_v5

C2

aHR0cDovLzQ1LjE0My4xMzguMTMz

aHR0cDovL2hhYmVyYXNhbmJpemRlbm96ZWxndW5kZW0uY28udnUv

Targets

    • Target

      15eae9134dac9268cbf005c23299c88dd5c5176a240201da751691a543375360.apk

    • Size

      4.7MB

    • MD5

      3fe3fa5fbebcf71367586d6d2a3824f9

    • SHA1

      900122232d087a1b189168096798ef40a94ac442

    • SHA256

      15eae9134dac9268cbf005c23299c88dd5c5176a240201da751691a543375360

    • SHA512

      e2e847e6a99a7e106429024d52b2898346f7bdd2d42d4ab815300fd4aa6448532ebd5e72e637bcc843f367d491c421f3144a1d8630fd9e0547a2b3f56d6144dd

    • SSDEEP

      98304:RWY/5eMi8wI0KAho87G0hsdQi3UGcJxuEfBAK7KSN1hwV:RW4e98VioNDdQi39cPrfBFKSNcV

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks