General

  • Target

    Tinder Premium (1).7z

  • Size

    4.0MB

  • Sample

    230313-nw1w1sab97

  • MD5

    55c4ddc10eba2f3432d88765635786fe

  • SHA1

    29c43bfa5e15fa3412dbf416792756d068492e30

  • SHA256

    1ac23747fbf6bc3c5ac928740e30b026d5ffbbd812f93de6453470d5473e50e9

  • SHA512

    f35771ca9819afc92448c107690b2648e668d2c5332b645f2cd947d7b7aee191a974eb0b30c0faaec1d5decec4eae82cce36d48f3201f27b8de19cdc310fd646

  • SSDEEP

    98304:eJSSd6tyVHJYGX6XqiNqV1Xmjj5qdz0hLdyAaLTFKqdP2H073NfvX8i:eJtRpJV66h1XylpdyHkqdPF3ZXZ

Malware Config

Targets

    • Target

      Tinder Premium (1).apk

    • Size

      4.5MB

    • MD5

      b9606454a3e24198b1551a24f6547473

    • SHA1

      ab038885e0eea1f6e3d6f26700f9b33154bb1886

    • SHA256

      0163e539625ea3e0a026af5606ff62762d10860feaec07f060137a2f36ed5644

    • SHA512

      3fa2dabf1a6aa6b64e27d691e0d9be0e62cead7d540185773769289481d8583c48828be7adb6494d419c5cbce614a4939691bf33f0839fd221d768a378b40062

    • SSDEEP

      98304:WJlj/TRyxPiZ9AvfRPr4thlijfwIhdagt7eFjo3yoriRhoF70cH:4rKP6OZT4Gj3h06SFjCdriXoNH

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks