Analysis
-
max time kernel
179s -
max time network
179s -
platform
android_x64 -
resource
android-33-x64-arm64-20240611.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240611.1-enlocale:en-usos:android-13-x64system -
submitted
21-06-2024 00:38
Behavioral task
behavioral1
Sample
da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902.apk
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral2
Sample
da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902.apk
Resource
android-33-x64-arm64-20240611.1-en
General
-
Target
da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902.apk
-
Size
4.4MB
-
MD5
823d8de1bd73ac64fa07a412734dccf1
-
SHA1
646b6e9789e813bc9aae8b406c7301fea391d8ad
-
SHA256
da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902
-
SHA512
42b810c7c9e08558832be4525bec6a17dfa9399a4ff9b5f81cf5c6a8f2f8e9579edb8e0a55b3ccb28414a2547daa7d78b30691029fb1179dd8ce7cde8709b826
-
SSDEEP
98304:lpgHpZ87W5cJRiVlrnxHe8n0kTV7X/ZFyniGs3P/rFYHP2Zr9j:qpWMcXi3UmJ7RsiGs3PJYo
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral2/memory/4264-0.dex family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.bean.waist/[email protected] 4264 com.bean.waist /data/user/0/com.bean.waist/[email protected] 4264 com.bean.waist -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.bean.waist -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.bean.waist -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.bean.waist -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.bean.waist
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD523c1696b63c1e3d44e50c6ebb6196e42
SHA1e204e02cd2354ed225f57d5170114eca827b93f1
SHA256004d3fba49899402d953819de96a3421c49e0df1efd705386d6a8745ebf3504b
SHA512d50783c087a01ebfa6db10149aa01289be8f9999094b06eb4db529280bb409c09138f80775e9a1c5677c3a87edcb6561465ec9f603560fabdbcaacf9fcfc1d4f
-
Filesize
4KB
MD5620f0b67a91f7f74151bc5be745b7110
SHA11ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA5122d23913d3759ef01704a86b4bee3ac8a29002313ecc98a7424425a78170f219577822fd77e4ae96313547696ad7d5949b58e12d5063ef2ee063b595740a3a12d
-
/data/data/com.bean.waist/oat/x86_64/[email protected]
Filesize56KB
MD5b8f6d6f576eddddf2895adbc0526d11e
SHA1b6f3d5f7a5bd489973ed2475e503c2a27853fb5f
SHA256ea8b927b1a21aa27c828f717545e0f372a9f165411fb1444cfab8e4fbf62899c
SHA5122ec4f0f56733090c63744cc772bd21be9aa07a4dcaea157ca6b1d9f409a1978b29ac9b0b44670778d27271fa34b3359b132c1497d3aeb2fa57e9de37a988c3b5
-
/data/user/0/com.bean.waist/[email protected]
Filesize1.9MB
MD5a4093ff606e7edf65c78c8da24d1d639
SHA187b80253a3655fa22173505f4147694f14161321
SHA25609f108c4f340c8ba35380ef0dc49c8dc51af2f8992e5643c8f211eccc0510ebe
SHA51252bfc258fd4f0efab3b13259213a2fd96d5e4800b2e517bd9b4fc46db1d3b05b14d9651d4cd197b88c1e0175a2a6e0eb6ac9bda1e6e338b4b81b481ecba652e8