General
-
Target
PancakeSwap.apk
-
Size
4.5MB
-
Sample
230312-npfbqsdf68
-
MD5
22d82606c804126663992f59e3d1f0c9
-
SHA1
a8a7c8896772bda9c5e17ce665eaabf32c0c959c
-
SHA256
f3fc80a8793e60a901da44b9ab315931699e64a4f3eddb8aba839fe860de46dc
-
SHA512
de8b90858bc7bd539383cd24b88c432586b09b9951d6f9a9ad2f6f0c46ba1042d00644b4c368fcfcc5ca6bba9182da5ceb5d495301cdc187c4fc2f4ef53487f0
-
SSDEEP
98304:jccN08QfEUXSRxAJDFJLhohK0/anjwH9U3RFRGOsR3oHFoZdt7+CSEpDj9O:jccN08iEUioJZJ1oXldciOsq0t7tSEC
Static task
static1
Behavioral task
behavioral1
Sample
PancakeSwap.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
PancakeSwap.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
PancakeSwap.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Targets
-
-
Target
PancakeSwap.apk
-
Size
4.5MB
-
MD5
22d82606c804126663992f59e3d1f0c9
-
SHA1
a8a7c8896772bda9c5e17ce665eaabf32c0c959c
-
SHA256
f3fc80a8793e60a901da44b9ab315931699e64a4f3eddb8aba839fe860de46dc
-
SHA512
de8b90858bc7bd539383cd24b88c432586b09b9951d6f9a9ad2f6f0c46ba1042d00644b4c368fcfcc5ca6bba9182da5ceb5d495301cdc187c4fc2f4ef53487f0
-
SSDEEP
98304:jccN08QfEUXSRxAJDFJLhohK0/anjwH9U3RFRGOsR3oHFoZdt7+CSEpDj9O:jccN08iEUioJZJ1oXldciOsq0t7tSEC
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-