Malware Analysis Report

2025-01-19 07:46

Sample ID 241204-12l19szkar
Target 5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8.bin
SHA256 5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8
Tags
soumnibot banker evasion infostealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8

Threat Level: Known bad

The file 5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8.bin was found to be: Known bad.

Malicious Activity Summary

soumnibot banker evasion infostealer trojan

Android SoumniBot payload

SoumniBot

Soumnibot family

Loads dropped Dex/Jar

Requests dangerous framework permissions

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-04 22:08

Signatures

Android SoumniBot payload

Description Indicator Process Target
N/A N/A N/A N/A

Soumnibot family

soumnibot

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A
Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-04 22:08

Reported

2024-12-04 22:11

Platform

android-x64-arm64-20240624-en

Max time kernel

4s

Max time network

132s

Command Line

cj.pass.simple

Signatures

Android SoumniBot payload

Description Indicator Process Target
N/A N/A N/A N/A

SoumniBot

trojan infostealer banker soumnibot

Soumnibot family

soumnibot

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/cj.pass.simple/[email protected] N/A N/A
N/A /data/user/0/cj.pass.simple/[email protected] N/A N/A

Processes

cj.pass.simple

Network

Country Destination Domain Proto
GB 142.250.187.238:443 tcp
GB 142.250.187.238:443 tcp
GB 142.250.187.238:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.201.104:443 ssl.google-analytics.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp

Files

/data/data/cj.pass.simple/.jiagu/libjiaguv1.so

MD5 671367d578c37daca6d5faf0a91dadde
SHA1 5d8c4cb90d2fcd91e5d7e5c30825eb21b9f9fd82
SHA256 a9a13d276654b09286a9cc0902eef6b3bacbdbc8c3eab7bc542c47de39213ecf
SHA512 77d95518cb1abbb6c78907177885e015f1c70c8ec23561b20a7511b4132febc8bd3734cc6ba0f0583adf22c9250e90a14b12e5ab216ef47812107880e515cd3b

/data/user/0/cj.pass.simple/[email protected]

MD5 dba69470971a6850ebae213f8d64c4a6
SHA1 1e10cd62a0024cadb15f37776f6d6c3548c1b679
SHA256 40638776672bd404c4a14c7f4356d17ff5c09e868ae685fd14861c6be3288e1e
SHA512 5351cd3377ac3f6c45973ec8bdd00203df3bdb521b2eb14632f45f1c115e2c319de71f2fb4b7374a7490e0c49c85042820d60bf12e8dc1ec6448c95078abd131

/data/data/cj.pass.simple/oat/x86_64/[email protected]

MD5 9f45062e488e05c07d21d851328e6699
SHA1 15578c2a8c47f87388b596819bad02d6188aec8c
SHA256 0d8c636ad5f3a51a4ee959405862644ed73f68027f8e964ac6978805bfaa4574
SHA512 3cacd8997d326881582ce8c39cd915785c7681331bbcf9020204017068c2017214bf0c8bde97890c271e616081db6c64ee495087b7de9a6c5b27e40afaffe52d