Resubmissions

08-03-2024 06:59

240308-hr38paaa23 10

27-03-2023 09:49

230327-lthxbacg65 10

General

  • Target

    GossApp.apk

  • Size

    4.7MB

  • Sample

    240308-hr38paaa23

  • MD5

    5cee458cb64d9c7a76783b571053adca

  • SHA1

    b89773087c9796b8088cfc4271829dffa156b4bc

  • SHA256

    bcbabb9b07b4d8e4b592dfaf3c8e261b66896134121b576b17f069eaeaeaa01f

  • SHA512

    8ea6bff4e67afc35a52ea5dfdb58cdb2e7dc26073d4ddfd2cc4e9757b1e769e9dca0fc5b43c56325aa54b98655d3dfa4a302e883bc9ffd33135894c8c30647a6

  • SSDEEP

    98304:Gwpw2RmWRq8ePkCcbBfowwD+6Qw+zJgT/gh002GD:G72Rb1eMCc4DiFdKa

Malware Config

Extracted

Family

sova

C2

http://85.217.144.114

http://85.217.144.115

Targets

    • Target

      GossApp.apk

    • Size

      4.7MB

    • MD5

      5cee458cb64d9c7a76783b571053adca

    • SHA1

      b89773087c9796b8088cfc4271829dffa156b4bc

    • SHA256

      bcbabb9b07b4d8e4b592dfaf3c8e261b66896134121b576b17f069eaeaeaa01f

    • SHA512

      8ea6bff4e67afc35a52ea5dfdb58cdb2e7dc26073d4ddfd2cc4e9757b1e769e9dca0fc5b43c56325aa54b98655d3dfa4a302e883bc9ffd33135894c8c30647a6

    • SSDEEP

      98304:Gwpw2RmWRq8ePkCcbBfowwD+6Qw+zJgT/gh002GD:G72Rb1eMCc4DiFdKa

    • SOVA_v5 payload

    • Sova

      Android banker first seen in July 2021.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads the contacts stored on the device.

    • Acquires the wake lock

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks