General

  • Target

    d6477dd8d3992c3586254e6dd27fc667489d3548ef1c35da57155aeddb237337.bin

  • Size

    3.0MB

  • Sample

    240710-112qbsveqd

  • MD5

    914779630cdb5fc78176708389d91442

  • SHA1

    af297bc026c7c9debf58af82805cd785dec10239

  • SHA256

    d6477dd8d3992c3586254e6dd27fc667489d3548ef1c35da57155aeddb237337

  • SHA512

    efef23b69ae7e59a6e548a0a91fde16dd7894804c0578357a245485afb57b49229b28bd60581084fdcb5163acee464dd8b975c33e3602cf90a36c8d2b7d5fb13

  • SSDEEP

    49152:xjwT+sZ3ry8N0/9v+D6npXjMO2p1V2esLNumVicjg1qHP2Zr9Kx6:xNS3ry8mRDnFN2pGe8uSHP2Zr9N

Malware Config

Targets

    • Target

      d6477dd8d3992c3586254e6dd27fc667489d3548ef1c35da57155aeddb237337.bin

    • Size

      3.0MB

    • MD5

      914779630cdb5fc78176708389d91442

    • SHA1

      af297bc026c7c9debf58af82805cd785dec10239

    • SHA256

      d6477dd8d3992c3586254e6dd27fc667489d3548ef1c35da57155aeddb237337

    • SHA512

      efef23b69ae7e59a6e548a0a91fde16dd7894804c0578357a245485afb57b49229b28bd60581084fdcb5163acee464dd8b975c33e3602cf90a36c8d2b7d5fb13

    • SSDEEP

      49152:xjwT+sZ3ry8N0/9v+D6npXjMO2p1V2esLNumVicjg1qHP2Zr9Kx6:xNS3ry8mRDnFN2pGe8uSHP2Zr9N

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks