General

  • Target

    e42d70c5a96497437f2ae074dc718001b2e6f271a43d21a0625d3b2f2ca2907c.bin

  • Size

    2.9MB

  • Sample

    240627-1z2nyatcqe

  • MD5

    e551692c1794051b16a9ab54c5637895

  • SHA1

    2e3536913ecb7ddd3d6608d9cc87aa3248ef0b26

  • SHA256

    e42d70c5a96497437f2ae074dc718001b2e6f271a43d21a0625d3b2f2ca2907c

  • SHA512

    d9dbe39698e00a85054bb05ab57ded2ddf79e68b25f7f3652398d8074952f54ded262ea265c8e383ecbb38539912291651fa9dbbe73beca85c04e9e4d0a8092c

  • SSDEEP

    49152:vg8KZxJESMQfvHT2jr5094C+0KDg/afQUsWKIpqVYVwY39T7prdnLzrCgEjiLyXd:OZxJZT2jr50+05lAqbal7VdnnugEjAyN

Malware Config

Targets

    • Target

      e42d70c5a96497437f2ae074dc718001b2e6f271a43d21a0625d3b2f2ca2907c.bin

    • Size

      2.9MB

    • MD5

      e551692c1794051b16a9ab54c5637895

    • SHA1

      2e3536913ecb7ddd3d6608d9cc87aa3248ef0b26

    • SHA256

      e42d70c5a96497437f2ae074dc718001b2e6f271a43d21a0625d3b2f2ca2907c

    • SHA512

      d9dbe39698e00a85054bb05ab57ded2ddf79e68b25f7f3652398d8074952f54ded262ea265c8e383ecbb38539912291651fa9dbbe73beca85c04e9e4d0a8092c

    • SSDEEP

      49152:vg8KZxJESMQfvHT2jr5094C+0KDg/afQUsWKIpqVYVwY39T7prdnLzrCgEjiLyXd:OZxJZT2jr50+05lAqbal7VdnnugEjAyN

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks