General

  • Target

    da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902.bin

  • Size

    4.4MB

  • Sample

    240621-azgqnaxgrj

  • MD5

    823d8de1bd73ac64fa07a412734dccf1

  • SHA1

    646b6e9789e813bc9aae8b406c7301fea391d8ad

  • SHA256

    da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902

  • SHA512

    42b810c7c9e08558832be4525bec6a17dfa9399a4ff9b5f81cf5c6a8f2f8e9579edb8e0a55b3ccb28414a2547daa7d78b30691029fb1179dd8ce7cde8709b826

  • SSDEEP

    98304:lpgHpZ87W5cJRiVlrnxHe8n0kTV7X/ZFyniGs3P/rFYHP2Zr9j:qpWMcXi3UmJ7RsiGs3PJYo

Malware Config

Targets

    • Target

      da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902.bin

    • Size

      4.4MB

    • MD5

      823d8de1bd73ac64fa07a412734dccf1

    • SHA1

      646b6e9789e813bc9aae8b406c7301fea391d8ad

    • SHA256

      da433be2058669b07a988adff07e5d01d2170990b7e286d6c79a6f6eb81c8902

    • SHA512

      42b810c7c9e08558832be4525bec6a17dfa9399a4ff9b5f81cf5c6a8f2f8e9579edb8e0a55b3ccb28414a2547daa7d78b30691029fb1179dd8ce7cde8709b826

    • SSDEEP

      98304:lpgHpZ87W5cJRiVlrnxHe8n0kTV7X/ZFyniGs3P/rFYHP2Zr9j:qpWMcXi3UmJ7RsiGs3PJYo

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks