General

  • Target

    dump.apk

  • Size

    6.3MB

  • Sample

    230405-eqsh1sbf77

  • MD5

    056d831fb3f4423ea395c02d68841887

  • SHA1

    7e7c3a6eaf542db371ca38a1ad9d6728b5d13daf

  • SHA256

    724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b

  • SHA512

    fe52d68fc2caacd72b7d4f5e808f34be84657b967b329446cf2e4f3c22fdeb9ca3dda058c3276cf1773fa937bf380da93688f93c07ce4c238a1c9694647c88d2

  • SSDEEP

    98304:6tObNxGuckjHfKQ2OXa1m5l3AMZTn7KKGDaY/2gZ6gjFAYJErRKmkPS:6tObNZKQ2OK1m5l37Zr7KKGegqW8QzS

Malware Config

Extracted

Family

sova

C2

http://193.42.32.84/

http://193.42.32.87/

Targets

    • Target

      dump.apk

    • Size

      6.3MB

    • MD5

      056d831fb3f4423ea395c02d68841887

    • SHA1

      7e7c3a6eaf542db371ca38a1ad9d6728b5d13daf

    • SHA256

      724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b

    • SHA512

      fe52d68fc2caacd72b7d4f5e808f34be84657b967b329446cf2e4f3c22fdeb9ca3dda058c3276cf1773fa937bf380da93688f93c07ce4c238a1c9694647c88d2

    • SSDEEP

      98304:6tObNxGuckjHfKQ2OXa1m5l3AMZTn7KKGDaY/2gZ6gjFAYJErRKmkPS:6tObNZKQ2OK1m5l37Zr7KKGegqW8QzS

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks