General

  • Target

    0954a38bb087f784567de05bdbb53da1fc7777bfde96f512446d662e855bc9f1.bin

  • Size

    3.5MB

  • Sample

    240907-1yzsysxfrk

  • MD5

    1c05d39828fe2fd4d5feb84564759276

  • SHA1

    7048d554b6a0c46a5e2dadb1711426cc93dbf9af

  • SHA256

    0954a38bb087f784567de05bdbb53da1fc7777bfde96f512446d662e855bc9f1

  • SHA512

    720f11c0a90b90ebda40bd08cfaf1733ccef4b6a5fc8976ae115307e58699ca94ad72c52d1730d37d31fd5a83ea7b1d63feb56c62b6c3ef75c232cfc1be18531

  • SSDEEP

    98304:aZxLZQVjr57+ZvNqUiFZkXwYu0NpLyRgXjeyhhwmOz/6FEj1V:EtZQPyNqUnu0SAxhmnhV

Malware Config

Targets

    • Target

      0954a38bb087f784567de05bdbb53da1fc7777bfde96f512446d662e855bc9f1.bin

    • Size

      3.5MB

    • MD5

      1c05d39828fe2fd4d5feb84564759276

    • SHA1

      7048d554b6a0c46a5e2dadb1711426cc93dbf9af

    • SHA256

      0954a38bb087f784567de05bdbb53da1fc7777bfde96f512446d662e855bc9f1

    • SHA512

      720f11c0a90b90ebda40bd08cfaf1733ccef4b6a5fc8976ae115307e58699ca94ad72c52d1730d37d31fd5a83ea7b1d63feb56c62b6c3ef75c232cfc1be18531

    • SSDEEP

      98304:aZxLZQVjr57+ZvNqUiFZkXwYu0NpLyRgXjeyhhwmOz/6FEj1V:EtZQPyNqUnu0SAxhmnhV

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks