Analysis
-
max time kernel
149s -
max time network
150s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
03/04/2025, 22:06
Behavioral task
behavioral1
Sample
49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01.apk
-
Size
2.6MB
-
MD5
706c06cc6f4ea9a1e9698543c0ef0917
-
SHA1
1aae9c15fadcca7f1fca672a9155434a60bc3e7f
-
SHA256
49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01
-
SHA512
bfa93a82b4127742d333c94d72899e5ba8f9feb46a6d3dc7534f754b9dfcb32244416cd5d0312af8924dd99b63c7b4e07943885c83a51fe610b5561e80b5cac8
-
SSDEEP
24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCvaC6D:RJWu0L8+mQbphVKeUuCMD
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Soumnibot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/drgke.rpgor.ewlgfv/app_drgke.rpgor.ewlgfv.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs 4504 drgke.rpgor.ewlgfv -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS drgke.rpgor.ewlgfv
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5962e477eb7bba1be1bbe44d230b48af7
SHA1c06bd3c4c1dbd1914dcf79c3624ac64741fbbfeb
SHA256eae7522d6c6168acf7fec898b91da5ca94c79ed0c25b0984edb290a88bc031d9
SHA512fedae8343d85d9ab73950fd2588a1e746b93280a659a068e3e06e7a7821a801332c061a675275aa23e50731e23fb8b8bae39d171a5a24871abc0123c69325d8d