Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    android-13_x64
  • resource
    android-33-x64-arm64-20240910-en
  • resource tags

    arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system
  • submitted
    03/04/2025, 22:05

General

  • Target

    6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0.apk

  • Size

    2.6MB

  • MD5

    c8322806aa34ea8c172a9cdeb7329894

  • SHA1

    8f5286e25c001181ad69813f936fb42d739f7729

  • SHA256

    6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0

  • SHA512

    b063839278cc497039c62d654f274e1d673a2ae8d309731e84bef467be42263bf327c5be9abeba07df924c57ff7dd6e64f535a4ee29f97541e382f882174cbd6

  • SSDEEP

    24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CHLU:4JWu0Oe9YYcgNNddSvCH4

Malware Config

Signatures

  • Android SoumniBot payload 1 IoCs
  • SoumniBot

    SoumniBot is an Android banking trojan first seen in April 2024.

  • Soumnibot family
  • Loads dropped Dex/Jar 1 TTPs 1 IoCs

    Runs executable file dropped to the device during analysis.

  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs

Processes

  • rekvgr.pedvoer.welfvcsd
    1⤵
    • Loads dropped Dex/Jar
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    PID:4515

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/user/0/rekvgr.pedvoer.welfvcsd/app_rekvgr.pedvoer.welfvcsd.AAbaseZZ.AABaseApplicationZZ/newobfs/0.pobfs

    Filesize

    1.8MB

    MD5

    0d3527c3dcc880a39d292f60b6fc4349

    SHA1

    0c71c8bf72579c4f64a568d747cae756c1074b11

    SHA256

    972eb15fa64f7315f1c4b2ba6b6dd16ba0b65eb090cf05183ebb203fcc9f5ba3

    SHA512

    c2b36668298e369d09ff01212d9ab7c84ff8d9b89202896c212d274bbcdcf24f0502cdc90fe27e6c974d6489f789be488fdbcd12d6e56b1e24c580e9d4477335