General

  • Target

    a5670c3aac98914a5362e772289462f6cbcc64401ff6f2616b302b33706f44ab.bin

  • Size

    3.0MB

  • Sample

    240529-2q485scg4x

  • MD5

    6b42038432d26334a9f5e654d97c9687

  • SHA1

    6976254adbe5617ffdf2e089f7b32fe798d4a95f

  • SHA256

    a5670c3aac98914a5362e772289462f6cbcc64401ff6f2616b302b33706f44ab

  • SHA512

    09b3018615bae97733ca0f42d74732ac853c0dba9c7aa076d833609902c6134777f3f6a22f94baaf4ed73efc4e238fc3da43129a6ab74b517d87ea7e9f02851d

  • SSDEEP

    49152:5mwu+ss8oqeK4VyLs+mVQXesLNM+vPMvg1aHP2Zr9KzPvA:5pnyeK4VyLmue8XmHP2Zr94A

Malware Config

Targets

    • Target

      a5670c3aac98914a5362e772289462f6cbcc64401ff6f2616b302b33706f44ab.bin

    • Size

      3.0MB

    • MD5

      6b42038432d26334a9f5e654d97c9687

    • SHA1

      6976254adbe5617ffdf2e089f7b32fe798d4a95f

    • SHA256

      a5670c3aac98914a5362e772289462f6cbcc64401ff6f2616b302b33706f44ab

    • SHA512

      09b3018615bae97733ca0f42d74732ac853c0dba9c7aa076d833609902c6134777f3f6a22f94baaf4ed73efc4e238fc3da43129a6ab74b517d87ea7e9f02851d

    • SSDEEP

      49152:5mwu+ss8oqeK4VyLs+mVQXesLNM+vPMvg1aHP2Zr9KzPvA:5pnyeK4VyLmue8XmHP2Zr94A

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks