General

  • Target

    e296acb4d04e85f7e12b01150ba93eb4e1ac011c00e67e6f4421a32b5f3d1cca.bin

  • Size

    4.2MB

  • Sample

    240719-1yessawbkc

  • MD5

    e71859c68b2f3fbbc2fe1b6ad0e87407

  • SHA1

    868a88a735721ad82a9bc91cd6b0f3264cbd535f

  • SHA256

    e296acb4d04e85f7e12b01150ba93eb4e1ac011c00e67e6f4421a32b5f3d1cca

  • SHA512

    d9a76ba4841eb60a1558e68dad1189e7709848cec9227000609732385da7f5e3f336f35fee85e6f37df9c79bf1bfc5778904fbc8c4c02a759ebd894c95870bdb

  • SSDEEP

    98304:4ZxmfI8OfPUjrBM6IQZlGiqHWjx1Few54mPDCgqOXPrgyguZnAtx6UEjrfTw:aqlOfPnQPCWjxfn54E+ZOf0qnBpP7w

Malware Config

Targets

    • Target

      e296acb4d04e85f7e12b01150ba93eb4e1ac011c00e67e6f4421a32b5f3d1cca.bin

    • Size

      4.2MB

    • MD5

      e71859c68b2f3fbbc2fe1b6ad0e87407

    • SHA1

      868a88a735721ad82a9bc91cd6b0f3264cbd535f

    • SHA256

      e296acb4d04e85f7e12b01150ba93eb4e1ac011c00e67e6f4421a32b5f3d1cca

    • SHA512

      d9a76ba4841eb60a1558e68dad1189e7709848cec9227000609732385da7f5e3f336f35fee85e6f37df9c79bf1bfc5778904fbc8c4c02a759ebd894c95870bdb

    • SSDEEP

      98304:4ZxmfI8OfPUjrBM6IQZlGiqHWjx1Few54mPDCgqOXPrgyguZnAtx6UEjrfTw:aqlOfPnQPCWjxfn54E+ZOf0qnBpP7w

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks