General

  • Target

    67cdce9dfee4dbad6981af897c13ad57b8a7a7971dcc34f2c24cb4623442f769.bin

  • Size

    4.4MB

  • Sample

    240719-1yc9yswbka

  • MD5

    4dc32b44b360973b719e8165bf672e24

  • SHA1

    78c841e3f736a93eb7c6fef45dd34a624b3e250d

  • SHA256

    67cdce9dfee4dbad6981af897c13ad57b8a7a7971dcc34f2c24cb4623442f769

  • SHA512

    0d1d240f79fce3270a02b7f0b538d3e122a6b94265dfe8896bd9a77ab3e6e7a4792dc80728a9c2ea43e02694da39a5423706eb9faacb6051090fa6e84f5d14fe

  • SSDEEP

    98304:3NxAB2Pi733Fz+EHx21xAYCL/MJhpFds2b2Pgt0Yv:DGy8zNR21xAYO/OhpsKtv

Malware Config

Targets

    • Target

      67cdce9dfee4dbad6981af897c13ad57b8a7a7971dcc34f2c24cb4623442f769.bin

    • Size

      4.4MB

    • MD5

      4dc32b44b360973b719e8165bf672e24

    • SHA1

      78c841e3f736a93eb7c6fef45dd34a624b3e250d

    • SHA256

      67cdce9dfee4dbad6981af897c13ad57b8a7a7971dcc34f2c24cb4623442f769

    • SHA512

      0d1d240f79fce3270a02b7f0b538d3e122a6b94265dfe8896bd9a77ab3e6e7a4792dc80728a9c2ea43e02694da39a5423706eb9faacb6051090fa6e84f5d14fe

    • SSDEEP

      98304:3NxAB2Pi733Fz+EHx21xAYCL/MJhpFds2b2Pgt0Yv:DGy8zNR21xAYO/OhpsKtv

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks