General

  • Target

    72099d34d441dedd77f44d9bd29ff167f44e2922df740ac8d97805e5787238b8.bin

  • Size

    4.9MB

  • Sample

    240816-1zzjkstcmr

  • MD5

    03f0780ca4e352b7b8729108d15e8e3c

  • SHA1

    327d1ef69f8ad21a312d6ec2969546f3435cfc4e

  • SHA256

    72099d34d441dedd77f44d9bd29ff167f44e2922df740ac8d97805e5787238b8

  • SHA512

    c9763b3431a630633fe9bf596cc6cb6efeeab9433c3474e3582b03293afb1cbd3bf8879f9154e5f438f75a6382ae95d6b0ae2988f22719fcfce01c2348d99a6d

  • SSDEEP

    98304:L9xxd8x8sDAVYoV0S747tFTIKCerELJXNqwy+otE850QLprqhGvhdc:3u8sToV5KCfLRN9yXuy0Srtc

Malware Config

Targets

    • Target

      72099d34d441dedd77f44d9bd29ff167f44e2922df740ac8d97805e5787238b8.bin

    • Size

      4.9MB

    • MD5

      03f0780ca4e352b7b8729108d15e8e3c

    • SHA1

      327d1ef69f8ad21a312d6ec2969546f3435cfc4e

    • SHA256

      72099d34d441dedd77f44d9bd29ff167f44e2922df740ac8d97805e5787238b8

    • SHA512

      c9763b3431a630633fe9bf596cc6cb6efeeab9433c3474e3582b03293afb1cbd3bf8879f9154e5f438f75a6382ae95d6b0ae2988f22719fcfce01c2348d99a6d

    • SSDEEP

      98304:L9xxd8x8sDAVYoV0S747tFTIKCerELJXNqwy+otE850QLprqhGvhdc:3u8sToV5KCfLRN9yXuy0Srtc

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks