Analysis
-
max time kernel
149s -
max time network
154s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
03/04/2025, 22:09
Behavioral task
behavioral1
Sample
0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db.apk
Resource
android-33-x64-arm64-20240910-en
General
-
Target
0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db.apk
-
Size
2.6MB
-
MD5
0de94f62bd76b3abc135eca2edc452b2
-
SHA1
b308a5a45ae3a3882bd494edc0e925e7d2a3681a
-
SHA256
0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db
-
SHA512
44d2d95e26d7563f4c8ea907159f6b232708c2e09229b77236e2a8ad13413bfe6044caabddfbe73dda779618cd8d7d8b02e0fadfef4c61bf3be1d1fe3b0bf299
-
SSDEEP
24576:G4m51+WtE0Ee93y/29339YPa8UGYqRpv+crRy5vstKctS3WCHUCxa42r:9JWu0n9l9X8UGL5r/RtS3WVCAr
Malware Config
Signatures
-
Android SoumniBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_soumnibot -
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Soumnibot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/rflg.ewdorgvf.edf/app_rflg.ewdorgvf.edf.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs 4527 rflg.ewdorgvf.edf -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS rflg.ewdorgvf.edf
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD50af274d1d131c1ec2c4d427aa24c7e11
SHA1acb5753b984e09a470cc2b75015eff90dc500d1f
SHA2569a84703777fd6622dffc5ea44de0420ba421bd139fd0ae165f95413adc5e2be3
SHA512ec0b906888b24210f6bb501f9043f030bc1c97c2437f85789e96d895d9b9383766086ea9f9d88e05dc409c2c8e45729370bdbb30730508600e05d76af1121301