General
-
Target
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974
-
Size
4.2MB
-
Sample
240702-h74t6awbpr
-
MD5
00aa9900205771b8c9e7927153b77cf2
-
SHA1
b43094c27584f5e0fc5feaa5c621e56d7c2f3ccb
-
SHA256
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974
-
SHA512
a19d2e339b25bea61b158bbd13f632793aeb4c3f20776793dd0bee15c4bd9283644d7915d55b46b6adf5803ca30651392dc6ccb40f843bdf0c72208fb70890d1
-
SSDEEP
98304:FZxlRoI9e3PxUjrBbuF1voH30PITIgN/S6zYx/EmZMRye0vLOYrlQEjLE:Huke3Px0u/QH70OYdEmGye0jLc
Static task
static1
Behavioral task
behavioral1
Sample
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974.apk
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974
-
Size
4.2MB
-
MD5
00aa9900205771b8c9e7927153b77cf2
-
SHA1
b43094c27584f5e0fc5feaa5c621e56d7c2f3ccb
-
SHA256
c17d5c8b8b68e6e574688e93b9c80e4cdcb15162614f465be0baecec0f261974
-
SHA512
a19d2e339b25bea61b158bbd13f632793aeb4c3f20776793dd0bee15c4bd9283644d7915d55b46b6adf5803ca30651392dc6ccb40f843bdf0c72208fb70890d1
-
SSDEEP
98304:FZxlRoI9e3PxUjrBbuF1voH30PITIgN/S6zYx/EmZMRye0vLOYrlQEjLE:Huke3Px0u/QH70OYdEmGye0jLc
-
Android SoumniBot payload
-
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Checks if the Android device is rooted.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Reads the contacts stored on the device.
-
Reads the content of photos stored on the user's device.
-
Reads the content of the MMS message.
-
Reads the content of the SMS messages.
-
Acquires the wake lock
-
Queries information about active data network
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
Checks the presence of a debugger
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1System Network Connections Discovery
1