General

  • Target

    376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4.zip

  • Size

    4.2MB

  • Sample

    230321-y85e3seh9w

  • MD5

    028178e2509689ae4742267e89abadab

  • SHA1

    43ce0ffb3851e206f05dd8a0cfc952cd375c00f9

  • SHA256

    0d89d33cd759dcefa2daf99b17aa49d1f430ed4e99feb8c9f1a6c49f0fce9268

  • SHA512

    8764c4d02cd9baad7f616d155fe645bc97132e716ea35831a580db8e6b488cda7a52fb3227609985ac987f2f42888f0b4024afe5edf26dc226201661e854f777

  • SSDEEP

    98304:byYn81cFTXK1RBH+FRFaM/x9dj1GmHK36tJ/vmxFj:fx61PH+J7VQMJ/uH

Malware Config

Targets

    • Target

      376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4.apk

    • Size

      4.6MB

    • MD5

      d4c6871dbd078685cb138a499113d280

    • SHA1

      60b64c8481f9de5b92634efc70a9ff42f451c78f

    • SHA256

      376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4

    • SHA512

      e8823b7c73140af88ad6fd8c52a6619d245281170ddb31feb9d4e726ee47a8f34575f687048947272fabfb13dbed2c24f50d6fbd6117d40c1db577305955af59

    • SSDEEP

      98304:M0C+HR25SOeU0lhoBenZFOw2QxW74PNTcG/bZ7vf0sc:jCmtO/07oEOw2QU74PNT9/t7nc

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Sova_v5

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks