General

  • Target

    119616fd656322872e4b19ff1e3fd3998d20d193f28959c87181564bc5dbbed8.bin

  • Size

    3.2MB

  • Sample

    240801-1y7tkaybrp

  • MD5

    de31228dddf98187ec2047930d6f4c00

  • SHA1

    9b9ea313e9b0c36a16d8f7af88ef7c9b9357ee2d

  • SHA256

    119616fd656322872e4b19ff1e3fd3998d20d193f28959c87181564bc5dbbed8

  • SHA512

    fbf996238ccd91f8c85408207a378599b4a8a46a39e1c1bd221033443a62ab0a25b46be8f8d74eb0511826ab3081e6e336c7fe20dee8c8434409dbd3a0d9f524

  • SSDEEP

    98304:YvE9N5Hb3tUjx9cV5kfl2V5Hnx0Jde8N0YVu:T3t+wkf6H3q0ou

Malware Config

Targets

    • Target

      119616fd656322872e4b19ff1e3fd3998d20d193f28959c87181564bc5dbbed8.bin

    • Size

      3.2MB

    • MD5

      de31228dddf98187ec2047930d6f4c00

    • SHA1

      9b9ea313e9b0c36a16d8f7af88ef7c9b9357ee2d

    • SHA256

      119616fd656322872e4b19ff1e3fd3998d20d193f28959c87181564bc5dbbed8

    • SHA512

      fbf996238ccd91f8c85408207a378599b4a8a46a39e1c1bd221033443a62ab0a25b46be8f8d74eb0511826ab3081e6e336c7fe20dee8c8434409dbd3a0d9f524

    • SSDEEP

      98304:YvE9N5Hb3tUjx9cV5kfl2V5Hnx0Jde8N0YVu:T3t+wkf6H3q0ou

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks