General
-
Target
376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk
-
Size
4.6MB
-
Sample
230324-fneptaed4v
-
MD5
d4c6871dbd078685cb138a499113d280
-
SHA1
60b64c8481f9de5b92634efc70a9ff42f451c78f
-
SHA256
376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4
-
SHA512
e8823b7c73140af88ad6fd8c52a6619d245281170ddb31feb9d4e726ee47a8f34575f687048947272fabfb13dbed2c24f50d6fbd6117d40c1db577305955af59
-
SSDEEP
98304:M0C+HR25SOeU0lhoBenZFOw2QxW74PNTcG/bZ7vf0sc:jCmtO/07oEOw2QU74PNT9/t7nc
Static task
static1
Behavioral task
behavioral1
Sample
376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
sova
http://193.42.32.84/
http://193.42.32.87/
Targets
-
-
Target
376D13AFFCBFC5D5358D39ABA16B814F711F2E81632059A4BCE5AF060E038EA4.apk
-
Size
4.6MB
-
MD5
d4c6871dbd078685cb138a499113d280
-
SHA1
60b64c8481f9de5b92634efc70a9ff42f451c78f
-
SHA256
376d13affcbfc5d5358d39aba16b814f711f2e81632059a4bce5af060e038ea4
-
SHA512
e8823b7c73140af88ad6fd8c52a6619d245281170ddb31feb9d4e726ee47a8f34575f687048947272fabfb13dbed2c24f50d6fbd6117d40c1db577305955af59
-
SSDEEP
98304:M0C+HR25SOeU0lhoBenZFOw2QxW74PNTcG/bZ7vf0sc:jCmtO/07oEOw2QU74PNT9/t7nc
Score10/10-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-