General

  • Target

    dc72a42c89e6f51c52d91785eaedf530c5f4ff3a48cf1a56495a1954b9379365.bin

  • Size

    3.1MB

  • Sample

    240722-11mlea1erj

  • MD5

    25646524daa0f618f13f2425a683a5f2

  • SHA1

    4f0225dd93165d93ada8cb0c97319935d6bbedcf

  • SHA256

    dc72a42c89e6f51c52d91785eaedf530c5f4ff3a48cf1a56495a1954b9379365

  • SHA512

    44a3650e765375365c315e3baaba8b768046e656f42357675ae4c95ae3a6c5f24018298a0d92dac476108996f47c447a7e524a2d94b87064fc0dc04892c2bf08

  • SSDEEP

    49152:KFgyh8INmHdHpgHhiUoLQ8jcovhYzpReiAU7W0csesLNhKedw:c8INmHdJgHhZ+QyqHTve8Ti

Malware Config

Targets

    • Target

      dc72a42c89e6f51c52d91785eaedf530c5f4ff3a48cf1a56495a1954b9379365.bin

    • Size

      3.1MB

    • MD5

      25646524daa0f618f13f2425a683a5f2

    • SHA1

      4f0225dd93165d93ada8cb0c97319935d6bbedcf

    • SHA256

      dc72a42c89e6f51c52d91785eaedf530c5f4ff3a48cf1a56495a1954b9379365

    • SHA512

      44a3650e765375365c315e3baaba8b768046e656f42357675ae4c95ae3a6c5f24018298a0d92dac476108996f47c447a7e524a2d94b87064fc0dc04892c2bf08

    • SSDEEP

      49152:KFgyh8INmHdHpgHhiUoLQ8jcovhYzpReiAU7W0csesLNhKedw:c8INmHdJgHhZ+QyqHTve8Ti

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks