General

  • Target

    9f91256fed5a4f296abb9dce99f07049d1f37965b9c7c2276a2ea88f60bc33af.bin

  • Size

    4.4MB

  • Sample

    240616-3r6n2atgpe

  • MD5

    98f28a699923e85c68d360771e423dd5

  • SHA1

    4334646e046deadba407f1d8b6f9670c6732a66b

  • SHA256

    9f91256fed5a4f296abb9dce99f07049d1f37965b9c7c2276a2ea88f60bc33af

  • SHA512

    d9c1f943e00dc3cbe00385bfc5ab4a089383d3d076d607e5f302931d6bae7d948a95fd051fd4ade81b204e7c4c7e97ed325d8390d99ada3c261f83de43620d47

  • SSDEEP

    98304:qdvE+3mEZ47Ew8Rf2UjZ5UByUOmdWhJ7/8QD2xcMZb2TVyt0zPb:f+246sfuByoWh1Elcamb

Malware Config

Targets

    • Target

      9f91256fed5a4f296abb9dce99f07049d1f37965b9c7c2276a2ea88f60bc33af.bin

    • Size

      4.4MB

    • MD5

      98f28a699923e85c68d360771e423dd5

    • SHA1

      4334646e046deadba407f1d8b6f9670c6732a66b

    • SHA256

      9f91256fed5a4f296abb9dce99f07049d1f37965b9c7c2276a2ea88f60bc33af

    • SHA512

      d9c1f943e00dc3cbe00385bfc5ab4a089383d3d076d607e5f302931d6bae7d948a95fd051fd4ade81b204e7c4c7e97ed325d8390d99ada3c261f83de43620d47

    • SSDEEP

      98304:qdvE+3mEZ47Ew8Rf2UjZ5UByUOmdWhJ7/8QD2xcMZb2TVyt0zPb:f+246sfuByoWh1Elcamb

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks