General
-
Target
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b.apk
-
Size
6.3MB
-
Sample
230405-s6x1bsfg38
-
MD5
056d831fb3f4423ea395c02d68841887
-
SHA1
7e7c3a6eaf542db371ca38a1ad9d6728b5d13daf
-
SHA256
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b
-
SHA512
fe52d68fc2caacd72b7d4f5e808f34be84657b967b329446cf2e4f3c22fdeb9ca3dda058c3276cf1773fa937bf380da93688f93c07ce4c238a1c9694647c88d2
-
SSDEEP
98304:6tObNxGuckjHfKQ2OXa1m5l3AMZTn7KKGDaY/2gZ6gjFAYJErRKmkPS:6tObNZKQ2OK1m5l37Zr7KKGegqW8QzS
Behavioral task
behavioral1
Sample
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b.apk
Resource
android-x64-arm64-20220823-en
Malware Config
Extracted
sova
http://193.42.32.84/
http://193.42.32.87/
Targets
-
-
Target
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b.apk
-
Size
6.3MB
-
MD5
056d831fb3f4423ea395c02d68841887
-
SHA1
7e7c3a6eaf542db371ca38a1ad9d6728b5d13daf
-
SHA256
724a56172f40177da76242ee169ac336b63d5df85889368d1531f593b658606b
-
SHA512
fe52d68fc2caacd72b7d4f5e808f34be84657b967b329446cf2e4f3c22fdeb9ca3dda058c3276cf1773fa937bf380da93688f93c07ce4c238a1c9694647c88d2
-
SSDEEP
98304:6tObNxGuckjHfKQ2OXa1m5l3AMZTn7KKGDaY/2gZ6gjFAYJErRKmkPS:6tObNZKQ2OK1m5l37Zr7KKGegqW8QzS
Score10/10-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Removes a system notification.
-