General
-
Target
Tinder Premium (1).7z
-
Size
4.0MB
-
Sample
230313-nw1w1sab97
-
MD5
55c4ddc10eba2f3432d88765635786fe
-
SHA1
29c43bfa5e15fa3412dbf416792756d068492e30
-
SHA256
1ac23747fbf6bc3c5ac928740e30b026d5ffbbd812f93de6453470d5473e50e9
-
SHA512
f35771ca9819afc92448c107690b2648e668d2c5332b645f2cd947d7b7aee191a974eb0b30c0faaec1d5decec4eae82cce36d48f3201f27b8de19cdc310fd646
-
SSDEEP
98304:eJSSd6tyVHJYGX6XqiNqV1Xmjj5qdz0hLdyAaLTFKqdP2H073NfvX8i:eJtRpJV66h1XylpdyHkqdPF3ZXZ
Static task
static1
Behavioral task
behavioral1
Sample
Tinder Premium (1).apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
Tinder Premium (1).apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
Tinder Premium (1).apk
-
Size
4.5MB
-
MD5
b9606454a3e24198b1551a24f6547473
-
SHA1
ab038885e0eea1f6e3d6f26700f9b33154bb1886
-
SHA256
0163e539625ea3e0a026af5606ff62762d10860feaec07f060137a2f36ed5644
-
SHA512
3fa2dabf1a6aa6b64e27d691e0d9be0e62cead7d540185773769289481d8583c48828be7adb6494d419c5cbce614a4939691bf33f0839fd221d768a378b40062
-
SSDEEP
98304:WJlj/TRyxPiZ9AvfRPr4thlijfwIhdagt7eFjo3yoriRhoF70cH:4rKP6OZT4Gj3h06SFjCdriXoNH
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-