General
-
Target
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4.apk
-
Size
4.7MB
-
Sample
230322-s8wkaabf3y
-
MD5
15c23886c4c3be5160c1db5e536cbc24
-
SHA1
304d205c56b2d374c12701c9c1e20cad068c24f2
-
SHA256
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4
-
SHA512
16a8db9cf15eb088bd24ed2fe3e366c8ec36ba3390833965f4cbbe47dc526fd349f9919f0ce42c04e9a0a911d1e847e37c52ef4384a80274a518e396dee3e624
-
SSDEEP
98304:+hoeT1ggRBPzVNk6KcWJVDdJ4FyII0azrzBlwrZMVJP0/hLNFe:+hhbnVu6LWJVZJuyxRrwSye
Static task
static1
Behavioral task
behavioral1
Sample
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4.apk
Resource
android-x64-20220823-en
Malware Config
Targets
-
-
Target
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4.apk
-
Size
4.7MB
-
MD5
15c23886c4c3be5160c1db5e536cbc24
-
SHA1
304d205c56b2d374c12701c9c1e20cad068c24f2
-
SHA256
cf13b9870395865dff925eee46eb85a087ac020e5e977f516e72dee346fbe2c4
-
SHA512
16a8db9cf15eb088bd24ed2fe3e366c8ec36ba3390833965f4cbbe47dc526fd349f9919f0ce42c04e9a0a911d1e847e37c52ef4384a80274a518e396dee3e624
-
SSDEEP
98304:+hoeT1ggRBPzVNk6KcWJVDdJ4FyII0azrzBlwrZMVJP0/hLNFe:+hhbnVu6LWJVZJuyxRrwSye
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-