General

  • Target

    30df97ff3e61e7d2be4e698222800deddecb3edb2154e03a3b8380ac6f6a9a08.bin

  • Size

    3.8MB

  • Sample

    240805-11axlsteqc

  • MD5

    79eb995a05ea272dfc681c8f5366f56a

  • SHA1

    a53b98dbc24f233df03647be83c448ce2fe30494

  • SHA256

    30df97ff3e61e7d2be4e698222800deddecb3edb2154e03a3b8380ac6f6a9a08

  • SHA512

    43bac1f2f70f989ad4a93c75302dca58933308e43cb5c428ec6e6a871e95db5589fb43654211591dbfac02650cf6c64be9f4cdf9c769c76ca67e9d9c9f705fa6

  • SSDEEP

    98304:3oZn20M8mUNiFKZ31HrV52gQYpyb2Nd4uwGnppS:3/0M89TZ31Hx5p1d4uwGppS

Malware Config

Targets

    • Target

      30df97ff3e61e7d2be4e698222800deddecb3edb2154e03a3b8380ac6f6a9a08.bin

    • Size

      3.8MB

    • MD5

      79eb995a05ea272dfc681c8f5366f56a

    • SHA1

      a53b98dbc24f233df03647be83c448ce2fe30494

    • SHA256

      30df97ff3e61e7d2be4e698222800deddecb3edb2154e03a3b8380ac6f6a9a08

    • SHA512

      43bac1f2f70f989ad4a93c75302dca58933308e43cb5c428ec6e6a871e95db5589fb43654211591dbfac02650cf6c64be9f4cdf9c769c76ca67e9d9c9f705fa6

    • SSDEEP

      98304:3oZn20M8mUNiFKZ31HrV52gQYpyb2Nd4uwGnppS:3/0M89TZ31Hx5p1d4uwGppS

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks