General
-
Target
GossApp.apk
-
Size
4.7MB
-
Sample
230327-lthxbacg65
-
MD5
5cee458cb64d9c7a76783b571053adca
-
SHA1
b89773087c9796b8088cfc4271829dffa156b4bc
-
SHA256
bcbabb9b07b4d8e4b592dfaf3c8e261b66896134121b576b17f069eaeaeaa01f
-
SHA512
8ea6bff4e67afc35a52ea5dfdb58cdb2e7dc26073d4ddfd2cc4e9757b1e769e9dca0fc5b43c56325aa54b98655d3dfa4a302e883bc9ffd33135894c8c30647a6
-
SSDEEP
98304:Gwpw2RmWRq8ePkCcbBfowwD+6Qw+zJgT/gh002GD:G72Rb1eMCc4DiFdKa
Static task
static1
Behavioral task
behavioral1
Sample
GossApp.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
GossApp.apk
Resource
android-x64-20220823-en
Malware Config
Extracted
sova
http://85.217.144.114
http://85.217.144.115
Extracted
sova_v5
http://85.217.144.114
http://85.217.144.115
Targets
-
-
Target
GossApp.apk
-
Size
4.7MB
-
MD5
5cee458cb64d9c7a76783b571053adca
-
SHA1
b89773087c9796b8088cfc4271829dffa156b4bc
-
SHA256
bcbabb9b07b4d8e4b592dfaf3c8e261b66896134121b576b17f069eaeaeaa01f
-
SHA512
8ea6bff4e67afc35a52ea5dfdb58cdb2e7dc26073d4ddfd2cc4e9757b1e769e9dca0fc5b43c56325aa54b98655d3dfa4a302e883bc9ffd33135894c8c30647a6
-
SSDEEP
98304:Gwpw2RmWRq8ePkCcbBfowwD+6Qw+zJgT/gh002GD:G72Rb1eMCc4DiFdKa
-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Removes a system notification.
-