General

  • Target

    37dece5838d2cedfa92893bdb9298cbe042ea7d7712d57928b8f428d9629934c.bin

  • Size

    3.0MB

  • Sample

    240514-1x98asbb24

  • MD5

    a520b243698c0f28d871ba377d002073

  • SHA1

    3d4c97debe3c44ea17550457108563c67bfe83fc

  • SHA256

    37dece5838d2cedfa92893bdb9298cbe042ea7d7712d57928b8f428d9629934c

  • SHA512

    2508d3e88460af2906dea66e6e983a7f741edcce570d5a40c4b0ad2bc7832f576c7a1d17359d2c131c5c2047d2c98440dedece3cff3023e7495dea22baae4139

  • SSDEEP

    49152:YBwt+sPTfOcN1OpZPISONdf7IuesLN1W8OQVg1hHP2Zr9KKt:Yt4Tme2adfxe8SbHP2Zr93t

Malware Config

Targets

    • Target

      37dece5838d2cedfa92893bdb9298cbe042ea7d7712d57928b8f428d9629934c.bin

    • Size

      3.0MB

    • MD5

      a520b243698c0f28d871ba377d002073

    • SHA1

      3d4c97debe3c44ea17550457108563c67bfe83fc

    • SHA256

      37dece5838d2cedfa92893bdb9298cbe042ea7d7712d57928b8f428d9629934c

    • SHA512

      2508d3e88460af2906dea66e6e983a7f741edcce570d5a40c4b0ad2bc7832f576c7a1d17359d2c131c5c2047d2c98440dedece3cff3023e7495dea22baae4139

    • SSDEEP

      49152:YBwt+sPTfOcN1OpZPISONdf7IuesLN1W8OQVg1hHP2Zr9KKt:Yt4Tme2adfxe8SbHP2Zr93t

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks