General

  • Target

    db36c3147ef7dabaa4bcff63706a26b64f2645d2219c7f3e94b51061f7a8528c.bin

  • Size

    3.0MB

  • Sample

    240803-134mpsxbql

  • MD5

    9c5bb1b31b08e649cbc0c75e322c2f6d

  • SHA1

    32280a57c112954e37039f340780a0a45a979b86

  • SHA256

    db36c3147ef7dabaa4bcff63706a26b64f2645d2219c7f3e94b51061f7a8528c

  • SHA512

    51505ce7f4c2e02aea4bbe77bad67763828f62ddc79a6256d640eb09ff63963c23bf2ff6a8a73bfb50acbc6a502137bdafdcc8e67caa7f27d11787fed4f48962

  • SSDEEP

    49152:A9wx+sbPaOCXTgS8Y5U8iDzcesLNHWDaITg1wHP2Zr9Kkf:A9MPF88SS8le8lQHP2Zr95

Malware Config

Targets

    • Target

      db36c3147ef7dabaa4bcff63706a26b64f2645d2219c7f3e94b51061f7a8528c.bin

    • Size

      3.0MB

    • MD5

      9c5bb1b31b08e649cbc0c75e322c2f6d

    • SHA1

      32280a57c112954e37039f340780a0a45a979b86

    • SHA256

      db36c3147ef7dabaa4bcff63706a26b64f2645d2219c7f3e94b51061f7a8528c

    • SHA512

      51505ce7f4c2e02aea4bbe77bad67763828f62ddc79a6256d640eb09ff63963c23bf2ff6a8a73bfb50acbc6a502137bdafdcc8e67caa7f27d11787fed4f48962

    • SSDEEP

      49152:A9wx+sbPaOCXTgS8Y5U8iDzcesLNHWDaITg1wHP2Zr9Kkf:A9MPF88SS8le8lQHP2Zr95

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks