Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    03/04/2025, 22:09

General

  • Target

    957e3355a08179547307484398f35d2a6f5be8cabb4c21be8049ebeda2924ebb.apk

  • Size

    1.4MB

  • MD5

    0e4f45648c8e0bf0f4d6c831d1826f62

  • SHA1

    615594a8c11375852acee87d2dcb6a048cb3cb46

  • SHA256

    957e3355a08179547307484398f35d2a6f5be8cabb4c21be8049ebeda2924ebb

  • SHA512

    4a0d40cb9584bf66e508fe5e11748589e37b59197fec85b8908d98ae17428440b7cbeb3737f8a8c68434c072aafc1eedee83e5bfa06c837dfaf93fe5e4670d3c

  • SSDEEP

    24576:5+4m51+WtE0P6+5knAK0sRcPSQwJD7LheotBTxwJj:XJWu0ivniBc7Lh7LTqJj

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • eferk.wepgfoerg.wqleafl
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4487

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/eferk.wepgfoerg.wqleafl/app_eferk.wepgfoerg.wqleafl.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    2a251f458b83416b9074dcf9692baa15

    SHA1

    e7b3eadeade3ceffcd4ef6b718f9874dd4c49143

    SHA256

    e03584f615ffd7e26135cba581fc94a01994fa90f422b0a1f3a837cf64dfb638

    SHA512

    8a6f42ab5a87977a87b0844b3c6e5a1ae79ff4c76a13506e3c61a3ae926ec93a58c093abe6775f704d1a53ad8e22c9e97f662bd8d262df79b31f820e79a82060