General
-
Target
Tinder Platinum.apk
-
Size
4.5MB
-
Sample
230312-nmqdxsdf64
-
MD5
9fd97bba5a8bd561071b90be6d5207e9
-
SHA1
b2994507a862cefc9344b2f6360a62f3f5b89ad8
-
SHA256
ec5b083c017570f846f6925b7c79d9e5886525a9b7ba7e514dabad0325c0af5e
-
SHA512
f9a9479bc1d83806236508adc1e6afb00afd5fc77e9f7035d3fce1d6f2a54b618ea9e0dedb2ba5c9a41ffa48789ba32837f71597687507f41e850584ec01a6e3
-
SSDEEP
98304:qUtLJViFl3R68N3uM9RhodP0glrb2151AhDq5ZpxvwaGZXG6Wn++yc:b+ZhN399XoVwT155ZwDXA+g
Static task
static1
Behavioral task
behavioral1
Sample
Tinder Platinum.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Tinder Platinum.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
Tinder Platinum.apk
-
Size
4.5MB
-
MD5
9fd97bba5a8bd561071b90be6d5207e9
-
SHA1
b2994507a862cefc9344b2f6360a62f3f5b89ad8
-
SHA256
ec5b083c017570f846f6925b7c79d9e5886525a9b7ba7e514dabad0325c0af5e
-
SHA512
f9a9479bc1d83806236508adc1e6afb00afd5fc77e9f7035d3fce1d6f2a54b618ea9e0dedb2ba5c9a41ffa48789ba32837f71597687507f41e850584ec01a6e3
-
SSDEEP
98304:qUtLJViFl3R68N3uM9RhodP0glrb2151AhDq5ZpxvwaGZXG6Wn++yc:b+ZhN399XoVwT155ZwDXA+g
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-