Analysis
-
max time kernel
149s -
max time network
152s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
03/04/2025, 22:07
Behavioral task
behavioral1
Sample
67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f.apk
-
Size
2.6MB
-
MD5
2cf5d0e30ada7faf1e6d850ece62e44c
-
SHA1
20e547eadc7e8a6fe11b109a8da39bdc2d4f35c8
-
SHA256
67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f
-
SHA512
9c729fd987a39d42962d93b391bb77962639eb8b1acb3c7dd988ea0811cd69b86651c9e71e682843cd4aed9bfec909bf38680cda5aa3706284f51309b653c103
-
SSDEEP
24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCjaUx9:RJWu0L8+mQbphVKeUuCl9
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Soumnibot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/drgke.rpgor.ewlgfv/app_drgke.rpgor.ewlgfv.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs 4510 drgke.rpgor.ewlgfv -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS drgke.rpgor.ewlgfv
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5962e477eb7bba1be1bbe44d230b48af7
SHA1c06bd3c4c1dbd1914dcf79c3624ac64741fbbfeb
SHA256eae7522d6c6168acf7fec898b91da5ca94c79ed0c25b0984edb290a88bc031d9
SHA512fedae8343d85d9ab73950fd2588a1e746b93280a659a068e3e06e7a7821a801332c061a675275aa23e50731e23fb8b8bae39d171a5a24871abc0123c69325d8d