Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    03/04/2025, 22:06

General

  • Target

    c61fc2292d27ee5ba346bf16c4b9972271962b39018d404d3976d4dda2c84360.apk

  • Size

    2.6MB

  • MD5

    6afe6226efb9a1b94e678ad89fc71fac

  • SHA1

    4d4713f81ab85b54e28946957d0e8aa1ac154d68

  • SHA256

    c61fc2292d27ee5ba346bf16c4b9972271962b39018d404d3976d4dda2c84360

  • SHA512

    bbef5b5f337cf93f0dc0c0c70e3fd52de5401c04276ae71b740389f1989f35530620a91c5b509830d4ac0616c1dd987c9e9e56b16123178a80f4f71495372f33

  • SSDEEP

    24576:c4m51+WtE0l7YXH94otRdb8hDlXKYP5FOFZWlsnYgfoC+Fi:rJWu0l7I/YPWWinYpC+c

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • remg.qwpfoewssd.vksdkf
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4513

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/remg.qwpfoewssd.vksdkf/app_remg.qwpfoewssd.vksdkf.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    062048257f8c2c64ec0bd0161ecad9ca

    SHA1

    b128c4f484b34196acc6390749344688264568d8

    SHA256

    004176e0fc06cc075b6216b4d43b3f225b180249792f21ed10e8653e27a8036e

    SHA512

    38809464d4fe947fd45c0f39a01c5e766df5bf18839111efedf56456002ee64f3ee2901cc5b2af057c2afa5b89d1e8cc7c7ce016eae1bd4b7f8505f0710825c9