General
-
Target
4b0e93354da17984f0bef68b9ab83380.bin
-
Size
4.3MB
-
Sample
230309-bpm1csgh5v
-
MD5
15169ff91884e9519ff5b063b8eb68bf
-
SHA1
c92b46e200ca060fce320721a5f0afcd73a4d836
-
SHA256
4b145be6d1fabdde7f70b80bd4f0a9d31611b14cd28e883982c45bedbd12b733
-
SHA512
94c2ccec87f1b6505c0f0ddce0578bc0422b9e805e6186b01e1947c576d83a10d1134c16aa5d5fd380418669ca4d4befb295aa3f9447f03839f09af4dd48c642
-
SSDEEP
98304:D26NaOiwXZXFNEWncjslVuM4ENGqrXc88nw5KXSOuYFh1d:D26N3fzVcjsb34EhrXcM5cdpd
Static task
static1
Behavioral task
behavioral1
Sample
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
sova_v5
aHR0cDovL25leHN1c2xhemltLm5ldDo1MDAw
aHR0cDovLzUuMTYxLjIzLjEyMjo1MDAw
aHR0cDovL25leHN1c2xhemltMS5uZXQ6NTAwMA\u003d\u003d
Targets
-
-
Target
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa.apk
-
Size
4.7MB
-
MD5
4b0e93354da17984f0bef68b9ab83380
-
SHA1
bff351735b6153339cc8d52089495db0533392b3
-
SHA256
bbaf483c2b6f67f22eb6e1fa00f200e9c1e201b0110070acaefd416cf846b1aa
-
SHA512
7353933b7919a87feae7345a09eb2e90bfa32723ae5a0df0d879ca29f0184ce799d1ed625564fc1d095154567618b8d4b79a6fadc0e1b669bafbfde9d6ff9933
-
SSDEEP
98304:pza2GxDDbL6zkfwe+0F3hoiLUpbcqon9BsTBAx5r3LyNXvOwxHMRA2QAFZ:pzMxDDbL6ew6Ro6Szo9BCBAxs8wtkA2f
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-