Analysis
-
max time kernel
149s -
max time network
158s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
03/04/2025, 22:06
Behavioral task
behavioral1
Sample
e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717.apk
-
Size
2.6MB
-
MD5
b27596da50c60b9ae7d30e217ab31fbf
-
SHA1
6ea5ee006bfffb37fc93fc636c263d577171ce00
-
SHA256
e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717
-
SHA512
34f2adc5fa916c280cb1727a8e96a4a2bd602fa8444314cb56ed7a18d4fa8ce4e7d8aee1b7cf0199f3ded5bd26673dfcda0fdbb8bad4f1f890694e8859674348
-
SSDEEP
24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCVaki:RJWu0L8+mQbphVKeUuC4
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Soumnibot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/drgke.rpgor.ewlgfv/app_drgke.rpgor.ewlgfv.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs 4513 drgke.rpgor.ewlgfv -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS drgke.rpgor.ewlgfv
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5962e477eb7bba1be1bbe44d230b48af7
SHA1c06bd3c4c1dbd1914dcf79c3624ac64741fbbfeb
SHA256eae7522d6c6168acf7fec898b91da5ca94c79ed0c25b0984edb290a88bc031d9
SHA512fedae8343d85d9ab73950fd2588a1e746b93280a659a068e3e06e7a7821a801332c061a675275aa23e50731e23fb8b8bae39d171a5a24871abc0123c69325d8d