Analysis
-
max time kernel
149s -
max time network
153s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
03/04/2025, 22:07
Behavioral task
behavioral1
Sample
10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509.apk
-
Size
2.6MB
-
MD5
3ea8bc01f668299b4ebeda4c8242e3e2
-
SHA1
b836281c48b75d6675c2caa2660baa5fa420efba
-
SHA256
10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509
-
SHA512
bc380cef800b780bd671b46ab798171154028701e8a4e3bd01ee9cc6c4c18836f8e341e0d709e2c8663f8dc89a4fcf1a29a6a88a4ab365dbec6d9765fd40314c
-
SSDEEP
24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuC8aUZ:RJWu0L8+mQbphVKeUuCK
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Soumnibot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/drgke.rpgor.ewlgfv/app_drgke.rpgor.ewlgfv.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs 4505 drgke.rpgor.ewlgfv -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS drgke.rpgor.ewlgfv
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5962e477eb7bba1be1bbe44d230b48af7
SHA1c06bd3c4c1dbd1914dcf79c3624ac64741fbbfeb
SHA256eae7522d6c6168acf7fec898b91da5ca94c79ed0c25b0984edb290a88bc031d9
SHA512fedae8343d85d9ab73950fd2588a1e746b93280a659a068e3e06e7a7821a801332c061a675275aa23e50731e23fb8b8bae39d171a5a24871abc0123c69325d8d