Resubmissions

18-12-2023 14:22

231218-rpvcfacfc8 10

24-03-2023 05:00

230324-fneptaed4v 10

21-03-2023 16:44

230321-t8talaca44 10

General

  • Target

    376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk

  • Size

    4.6MB

  • Sample

    230321-t8talaca44

  • MD5

    d4c6871dbd078685cb138a499113d280

  • SHA1

    60b64c8481f9de5b92634efc70a9ff42f451c78f

  • SHA256

    376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4

  • SHA512

    e8823b7c73140af88ad6fd8c52a6619d245281170ddb31feb9d4e726ee47a8f34575f687048947272fabfb13dbed2c24f50d6fbd6117d40c1db577305955af59

  • SSDEEP

    98304:M0C+HR25SOeU0lhoBenZFOw2QxW74PNTcG/bZ7vf0sc:jCmtO/07oEOw2QU74PNT9/t7nc

Malware Config

Targets

    • Target

      376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk

    • Size

      4.6MB

    • MD5

      d4c6871dbd078685cb138a499113d280

    • SHA1

      60b64c8481f9de5b92634efc70a9ff42f451c78f

    • SHA256

      376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4

    • SHA512

      e8823b7c73140af88ad6fd8c52a6619d245281170ddb31feb9d4e726ee47a8f34575f687048947272fabfb13dbed2c24f50d6fbd6117d40c1db577305955af59

    • SSDEEP

      98304:M0C+HR25SOeU0lhoBenZFOw2QxW74PNTcG/bZ7vf0sc:jCmtO/07oEOw2QU74PNT9/t7nc

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks