General

  • Target

    ebe706fe2992c1fe438aa3d8df51b3a392a57803bf530c34fe005366a322b6da.bin

  • Size

    4.7MB

  • Sample

    240730-1xf98a1fjr

  • MD5

    930d276beaffbaf14c339415f47c398a

  • SHA1

    caea438c04c78e5023ddc6b39729960530e3d25b

  • SHA256

    ebe706fe2992c1fe438aa3d8df51b3a392a57803bf530c34fe005366a322b6da

  • SHA512

    befe8579c4e9eb088a8d6b4821c1df6f51492ae26cbfc44dfa24176ef997cd5b78c2c5649989b697daab6a2f7cc4b60084e77f994ff1fa5b4a15b0bb05739821

  • SSDEEP

    98304:X5gHdZla58f4yquKjjc+Bse8I0k9V7X/ZFyniGs3P/nFwsP2Zr9Z1KQ:0dn5f4od+BJVf7RsiGs3P9wh1KQ

Malware Config

Targets

    • Target

      ebe706fe2992c1fe438aa3d8df51b3a392a57803bf530c34fe005366a322b6da.bin

    • Size

      4.7MB

    • MD5

      930d276beaffbaf14c339415f47c398a

    • SHA1

      caea438c04c78e5023ddc6b39729960530e3d25b

    • SHA256

      ebe706fe2992c1fe438aa3d8df51b3a392a57803bf530c34fe005366a322b6da

    • SHA512

      befe8579c4e9eb088a8d6b4821c1df6f51492ae26cbfc44dfa24176ef997cd5b78c2c5649989b697daab6a2f7cc4b60084e77f994ff1fa5b4a15b0bb05739821

    • SSDEEP

      98304:X5gHdZla58f4yquKjjc+Bse8I0k9V7X/ZFyniGs3P/nFwsP2Zr9Z1KQ:0dn5f4od+BJVf7RsiGs3P9wh1KQ

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks