Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    03/04/2025, 22:04

General

  • Target

    ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385.apk

  • Size

    2.6MB

  • MD5

    740ddb167cfe8f9cb80d01143bf344c3

  • SHA1

    b5a6ce5f7335d8e05c872e3fb028d7ac047730c8

  • SHA256

    ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385

  • SHA512

    0d7a76b7a7b86d893f152f3d87c5fd903e8e112b99afcb5b43cd51d5383da748327c881c04efd487b4227cc4819c9b80486d80010defa1966e5ba13a0cd7894e

  • SSDEEP

    24576:v18V4m51+WtE0fC+ynIQ0bA9PLo65gOeJyhCt7HPgcBd8SmLK4+TtWx:v18mJWu0fC3a0KQM/Bd8SJc

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • rjg.espwfdvowe.vkswd
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4469

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/rjg.espwfdvowe.vkswd/app_rjg.espwfdvowe.vkswd.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    49ceebd22c53a13bcebf1d0b6cc8a312

    SHA1

    a1fa600831c7a3e7a6e826c388a4c043a413bb3b

    SHA256

    3db5bbd6529cda0e747764d9f42ba21dc41f2e9940d7401ef76d9e9f87e6655a

    SHA512

    d9fb5f080ddaf378977b7dca1a8f3d8663508637e9e29ae5a35ecfb5121c660f586829a0cf44065f8207ba2bc9d9aed9d5290016b5edb3dbba703f505651e46a