Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    03/04/2025, 22:06

General

  • Target

    49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01.apk

  • Size

    2.6MB

  • MD5

    706c06cc6f4ea9a1e9698543c0ef0917

  • SHA1

    1aae9c15fadcca7f1fca672a9155434a60bc3e7f

  • SHA256

    49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01

  • SHA512

    bfa93a82b4127742d333c94d72899e5ba8f9feb46a6d3dc7534f754b9dfcb32244416cd5d0312af8924dd99b63c7b4e07943885c83a51fe610b5561e80b5cac8

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCvaC6D:RJWu0L8+mQbphVKeUuCMD

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • drgke.rpgor.ewlgfv
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4504

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/drgke.rpgor.ewlgfv/app_drgke.rpgor.ewlgfv.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    962e477eb7bba1be1bbe44d230b48af7

    SHA1

    c06bd3c4c1dbd1914dcf79c3624ac64741fbbfeb

    SHA256

    eae7522d6c6168acf7fec898b91da5ca94c79ed0c25b0984edb290a88bc031d9

    SHA512

    fedae8343d85d9ab73950fd2588a1e746b93280a659a068e3e06e7a7821a801332c061a675275aa23e50731e23fb8b8bae39d171a5a24871abc0123c69325d8d