Resubmissions

27-03-2023 06:51

230327-hmx6wacb39 10

12-03-2023 11:31

230312-nmqdxsdf64 10

General

  • Target

    Tinder Platinum.apk

  • Size

    4.5MB

  • Sample

    230327-hmx6wacb39

  • MD5

    9fd97bba5a8bd561071b90be6d5207e9

  • SHA1

    b2994507a862cefc9344b2f6360a62f3f5b89ad8

  • SHA256

    ec5b083c017570f846f6925b7c79d9e5886525a9b7ba7e514dabad0325c0af5e

  • SHA512

    f9a9479bc1d83806236508adc1e6afb00afd5fc77e9f7035d3fce1d6f2a54b618ea9e0dedb2ba5c9a41ffa48789ba32837f71597687507f41e850584ec01a6e3

  • SSDEEP

    98304:qUtLJViFl3R68N3uM9RhodP0glrb2151AhDq5ZpxvwaGZXG6Wn++yc:b+ZhN399XoVwT155ZwDXA+g

Malware Config

Extracted

Family

sova

C2

http://85.31.45.101

Targets

    • Target

      Tinder Platinum.apk

    • Size

      4.5MB

    • MD5

      9fd97bba5a8bd561071b90be6d5207e9

    • SHA1

      b2994507a862cefc9344b2f6360a62f3f5b89ad8

    • SHA256

      ec5b083c017570f846f6925b7c79d9e5886525a9b7ba7e514dabad0325c0af5e

    • SHA512

      f9a9479bc1d83806236508adc1e6afb00afd5fc77e9f7035d3fce1d6f2a54b618ea9e0dedb2ba5c9a41ffa48789ba32837f71597687507f41e850584ec01a6e3

    • SSDEEP

      98304:qUtLJViFl3R68N3uM9RhodP0glrb2151AhDq5ZpxvwaGZXG6Wn++yc:b+ZhN399XoVwT155ZwDXA+g

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks