General

  • Target

    8b445d1eec0daa3321354e55cad0fa01e8b8b1bff1ce2b7dd72698e5de309850.bin

  • Size

    3.1MB

  • Sample

    240729-1wx7caxbra

  • MD5

    cb2b5dd135ed9b4034fe565961c446a8

  • SHA1

    a6177c596e210cb2d2cadf441f9702653a56b4a7

  • SHA256

    8b445d1eec0daa3321354e55cad0fa01e8b8b1bff1ce2b7dd72698e5de309850

  • SHA512

    553bb1fa7f25d77bd1a893abd6da415851855217b877a497530fa34978c3482cef0f5b832563e768bb274ee3f590f213deba791eeb0760ee09fc2cd3088c06ee

  • SSDEEP

    49152:NFgy78dNkHLHhgHliUAtmEcxfRE1i0nroYXf+LesLNgEZXQS:J8dNkHLBgHlZrX3tGoYPKe8rB

Malware Config

Targets

    • Target

      8b445d1eec0daa3321354e55cad0fa01e8b8b1bff1ce2b7dd72698e5de309850.bin

    • Size

      3.1MB

    • MD5

      cb2b5dd135ed9b4034fe565961c446a8

    • SHA1

      a6177c596e210cb2d2cadf441f9702653a56b4a7

    • SHA256

      8b445d1eec0daa3321354e55cad0fa01e8b8b1bff1ce2b7dd72698e5de309850

    • SHA512

      553bb1fa7f25d77bd1a893abd6da415851855217b877a497530fa34978c3482cef0f5b832563e768bb274ee3f590f213deba791eeb0760ee09fc2cd3088c06ee

    • SSDEEP

      49152:NFgy78dNkHLHhgHliUAtmEcxfRE1i0nroYXf+LesLNgEZXQS:J8dNkHLBgHlZrX3tGoYPKe8rB

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks