General

  • Target

    6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1

  • Size

    3.4MB

  • Sample

    231219-3kgfkabff7

  • MD5

    c9ddaa4d670c262bf2621b8299ccf84e

  • SHA1

    8773fe52563b9aa22909e53671d99d1277427f87

  • SHA256

    6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1

  • SHA512

    786e56c8011f179f96b489b7ad8f97185194ae3221f108ca5badb6aef3007d2f54ab3dd3ac4c43290b8dca0cfacb9d4387c7dd8099823a4fdf1b54069abd77f9

  • SSDEEP

    98304:hJJ7q4BP+NGHd/UMZ7VvJlptaqnQuT/cVSIzqh4mUhkB82+:h3XBPaYblzlpzQG7ph4W82+

Malware Config

Targets

    • Target

      6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1

    • Size

      3.4MB

    • MD5

      c9ddaa4d670c262bf2621b8299ccf84e

    • SHA1

      8773fe52563b9aa22909e53671d99d1277427f87

    • SHA256

      6d1566ffd1f60ed64b798ca1eea093982c43e1e88c096bc69dd98e0fd5c1c2d1

    • SHA512

      786e56c8011f179f96b489b7ad8f97185194ae3221f108ca5badb6aef3007d2f54ab3dd3ac4c43290b8dca0cfacb9d4387c7dd8099823a4fdf1b54069abd77f9

    • SSDEEP

      98304:hJJ7q4BP+NGHd/UMZ7VvJlptaqnQuT/cVSIzqh4mUhkB82+:h3XBPaYblzlpzQG7ph4W82+

    • Sova

      Android banker first seen in July 2021.

    • Sova payload

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks