General

  • Target

    749db653fde51070c2f65eb11541df8d04ee9ec61cdc24a118e23359f5a5b3de.bin

  • Size

    3.4MB

  • Sample

    240501-1yh57sbc52

  • MD5

    e2bc76b5a154e76e2d66eaf64b1d5545

  • SHA1

    88c81a7180c3e12a579080a663ff71798e58cd22

  • SHA256

    749db653fde51070c2f65eb11541df8d04ee9ec61cdc24a118e23359f5a5b3de

  • SHA512

    eeb5c46ff881b16f7024b32e74d4ee333df70d3889b181552e0030b320f0875be23d69daeb38fa1570cb65599765ba84232b58ae9f0f51ecaf9435e4347d9c4f

  • SSDEEP

    98304:+ZxnXU2jr57g8j6igpTGlVNsYKjAvZTSqneEjCx:gBXUogY6DpTGlvsYKQZLD+x

Malware Config

Targets

    • Target

      749db653fde51070c2f65eb11541df8d04ee9ec61cdc24a118e23359f5a5b3de.bin

    • Size

      3.4MB

    • MD5

      e2bc76b5a154e76e2d66eaf64b1d5545

    • SHA1

      88c81a7180c3e12a579080a663ff71798e58cd22

    • SHA256

      749db653fde51070c2f65eb11541df8d04ee9ec61cdc24a118e23359f5a5b3de

    • SHA512

      eeb5c46ff881b16f7024b32e74d4ee333df70d3889b181552e0030b320f0875be23d69daeb38fa1570cb65599765ba84232b58ae9f0f51ecaf9435e4347d9c4f

    • SSDEEP

      98304:+ZxnXU2jr57g8j6igpTGlVNsYKjAvZTSqneEjCx:gBXUogY6DpTGlvsYKQZLD+x

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks