Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    27/03/2025, 22:13

General

  • Target

    9fcc3e1b081443d078b86e55b2efe23a5d3d4277e36334216f2f7eb92c3dada0.apk

  • Size

    2.6MB

  • MD5

    b84cf63ea461c97048c85b2fc6b7e49a

  • SHA1

    66c146e7b833d7b564de1fe5410e75e5ab23ef8a

  • SHA256

    9fcc3e1b081443d078b86e55b2efe23a5d3d4277e36334216f2f7eb92c3dada0

  • SHA512

    f0a8013b8df44f87496a3eea24b9a99583f7dedbf82bcff627cca59282c4af6b612d275096d17c4d94b4a8b6be1ae498532600bcdd882ee563dfcbec0a7f6f45

  • SSDEEP

    24576:St4m51+WtE0dLPYfK8auztf28P6MjFd5TPa4PkCRWI2yrlpBsj4y+QQOQ3A7O6Nw:zJWu0aTP6CNa9v/gRC5Y

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • sgrdrfl.epgordsf.wsakfc
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4477

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/sgrdrfl.epgordsf.wsakfc/app_sgrdrfl.epgordsf.wsakfc.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    3a73c0d0c2dc549322f8f4714e612c79

    SHA1

    da2f65cbf9c8933edb543600b1b3f8997d231c65

    SHA256

    af74e5987b7d523043c63c71d4e730a4192ef274f066efdaabfd843a77d9a035

    SHA512

    7da0c1f12aa7e3d021bff3e6cfac3b34acf19efe477846bbe045a05ccfe10010185454923561174f376facc24ff93913c61159955fa9b47771ad795aa2e24dcb