General

  • Target

    PancakeSwap.apk

  • Size

    4.5MB

  • Sample

    230312-npfbqsdf68

  • MD5

    22d82606c804126663992f59e3d1f0c9

  • SHA1

    a8a7c8896772bda9c5e17ce665eaabf32c0c959c

  • SHA256

    f3fc80a8793e60a901da44b9ab315931699e64a4f3eddb8aba839fe860de46dc

  • SHA512

    de8b90858bc7bd539383cd24b88c432586b09b9951d6f9a9ad2f6f0c46ba1042d00644b4c368fcfcc5ca6bba9182da5ceb5d495301cdc187c4fc2f4ef53487f0

  • SSDEEP

    98304:jccN08QfEUXSRxAJDFJLhohK0/anjwH9U3RFRGOsR3oHFoZdt7+CSEpDj9O:jccN08iEUioJZJ1oXldciOsq0t7tSEC

Malware Config

Targets

    • Target

      PancakeSwap.apk

    • Size

      4.5MB

    • MD5

      22d82606c804126663992f59e3d1f0c9

    • SHA1

      a8a7c8896772bda9c5e17ce665eaabf32c0c959c

    • SHA256

      f3fc80a8793e60a901da44b9ab315931699e64a4f3eddb8aba839fe860de46dc

    • SHA512

      de8b90858bc7bd539383cd24b88c432586b09b9951d6f9a9ad2f6f0c46ba1042d00644b4c368fcfcc5ca6bba9182da5ceb5d495301cdc187c4fc2f4ef53487f0

    • SSDEEP

      98304:jccN08QfEUXSRxAJDFJLhohK0/anjwH9U3RFRGOsR3oHFoZdt7+CSEpDj9O:jccN08iEUioJZJ1oXldciOsq0t7tSEC

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks