General
-
Target
sample-2342978-d87e04db4f4a36df263ecbfe8a8605bd.zip
-
Size
3.9MB
-
Sample
230411-r9z4eseg5s
-
MD5
bb3286b6e0a375bb45479025f3ab5887
-
SHA1
adac059eba391beedc8b59b5dbc4ebbcedd7354e
-
SHA256
ac65bd56ae8518497951393645a33ec9d906d19bafb85d07998705d08c9a29bd
-
SHA512
7258a4228a3e5b4573b21861990b27ec3febfc3de4f414223a6925dc1f1e7167daba9d266b4896dfa54023df58af499c7054898f93129b93abc36974f5927427
-
SSDEEP
98304:7vZ6LDkRTaZ20xAyBIOj+6wzxXkq/vhnZblXSyVB:7vYMTaZXxAxzxU6PpLB
Static task
static1
Behavioral task
behavioral1
Sample
U54LmYEms3.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
U54LmYEms3.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
sova
http://5.161.97.57:5000/
Targets
-
-
Target
U54LmYEms3
-
Size
4.3MB
-
MD5
d87e04db4f4a36df263ecbfe8a8605bd
-
SHA1
1c99c658e30c672927dccbd8628107abf36d990d
-
SHA256
3dcd8e0cf7403ede8d56df9d53df26266176c3c9255a5979da08f5e8bb60ee3f
-
SHA512
101c8f7326e1d617f515ce94490a54772c2550e3b48158a055f3ea2c47efa82e9a90ea626e60f7f2cf3dbf36be77599fb8a3b9f1620c28b8253549069a1a2d5d
-
SSDEEP
98304:gjYTsK5/hRKuT8kLp0EDb1putwdre5VRLmoVE9zOEhqRbcs:/wK55J8gRBp3dre5VRaoe9zhibV
Score10/10-
SOVA_v5 payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Removes a system notification.
-