General

  • Target

    d8af7527d8a4076f89ae56c2cb6f06fdb4540dea653e9b2b162e7523b37faebc.bin

  • Size

    3.0MB

  • Sample

    240514-1zdl4sbb86

  • MD5

    1f94fa509684ae16c591e7f040bed6c6

  • SHA1

    1ff1c03d4a047e6be698e2cde17709e2224492d6

  • SHA256

    d8af7527d8a4076f89ae56c2cb6f06fdb4540dea653e9b2b162e7523b37faebc

  • SHA512

    52d9fc89838fef68fbee448520a145d153c74278200467778a7f98c6aeaddaa12bf9538a9cc9bd8bda2c8bef3f3d340a7f36d0f9a05f5ce6be377bc13855c931

  • SSDEEP

    49152:wnwH+sRe0XIfKfFvbBpLJE0fEDesLNQqrCoLg16HP2Zr9K1Xlm:wt+e0YfMFjrfUe8y6HP2Zr9AX8

Malware Config

Targets

    • Target

      d8af7527d8a4076f89ae56c2cb6f06fdb4540dea653e9b2b162e7523b37faebc.bin

    • Size

      3.0MB

    • MD5

      1f94fa509684ae16c591e7f040bed6c6

    • SHA1

      1ff1c03d4a047e6be698e2cde17709e2224492d6

    • SHA256

      d8af7527d8a4076f89ae56c2cb6f06fdb4540dea653e9b2b162e7523b37faebc

    • SHA512

      52d9fc89838fef68fbee448520a145d153c74278200467778a7f98c6aeaddaa12bf9538a9cc9bd8bda2c8bef3f3d340a7f36d0f9a05f5ce6be377bc13855c931

    • SSDEEP

      49152:wnwH+sRe0XIfKfFvbBpLJE0fEDesLNQqrCoLg16HP2Zr9K1Xlm:wt+e0YfMFjrfUe8y6HP2Zr9AX8

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks