General

  • Target

    24d48146d3eba4deb755d0023a237d8e3d67ecc4d108feed9f058f29d6cb5efe.bin

  • Size

    4.4MB

  • Sample

    240621-ady3tatakc

  • MD5

    b8fe7b5c61521ab258fba7bd5f82305b

  • SHA1

    255b19bea55a8f5f368695ebc66fd7c41784e1d7

  • SHA256

    24d48146d3eba4deb755d0023a237d8e3d67ecc4d108feed9f058f29d6cb5efe

  • SHA512

    617b01519cfbcb42784850e81c820dd68bc44d7220643e5f032d50240ac418c6981c04feb62359f3009c28a88e36d8b8e6fb49935ed23200d50433bc8cdd85c0

  • SSDEEP

    98304:lpgHpZ87W5cJRiVlrnxHe8n0kTV7X/ZFyniGs3P/rFYHP2Zr9v:qpWMcXi3UmJ7RsiGs3PJYM

Malware Config

Targets

    • Target

      24d48146d3eba4deb755d0023a237d8e3d67ecc4d108feed9f058f29d6cb5efe.bin

    • Size

      4.4MB

    • MD5

      b8fe7b5c61521ab258fba7bd5f82305b

    • SHA1

      255b19bea55a8f5f368695ebc66fd7c41784e1d7

    • SHA256

      24d48146d3eba4deb755d0023a237d8e3d67ecc4d108feed9f058f29d6cb5efe

    • SHA512

      617b01519cfbcb42784850e81c820dd68bc44d7220643e5f032d50240ac418c6981c04feb62359f3009c28a88e36d8b8e6fb49935ed23200d50433bc8cdd85c0

    • SSDEEP

      98304:lpgHpZ87W5cJRiVlrnxHe8n0kTV7X/ZFyniGs3P/rFYHP2Zr9v:qpWMcXi3UmJ7RsiGs3PJYM

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks