Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    27/03/2025, 22:09

General

  • Target

    47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f.apk

  • Size

    2.6MB

  • MD5

    1033f8f55c4b53a464ebdcf1ffca0190

  • SHA1

    2aa52592ed476ffae97f1460435287dcb4e3a859

  • SHA256

    47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f

  • SHA512

    f99851883a97bf1386b7b7d1949a175c2173004baf62d24225e82ec6626c118e68c4d4bf8b4a066a76bdb98f7858e6592c7d852cf8daefed909d58f93186ba2d

  • SSDEEP

    24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CL0W9:4JWu0Oe9YYcgNNddSvCLt

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • rekvgr.pedvoer.welfvcsd
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4470

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/rekvgr.pedvoer.welfvcsd/app_rekvgr.pedvoer.welfvcsd.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    0d3527c3dcc880a39d292f60b6fc4349

    SHA1

    0c71c8bf72579c4f64a568d747cae756c1074b11

    SHA256

    972eb15fa64f7315f1c4b2ba6b6dd16ba0b65eb090cf05183ebb203fcc9f5ba3

    SHA512

    c2b36668298e369d09ff01212d9ab7c84ff8d9b89202896c212d274bbcdcf24f0502cdc90fe27e6c974d6489f789be488fdbcd12d6e56b1e24c580e9d4477335