General

  • Target

    b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1.bin

  • Size

    3.5MB

  • Sample

    240916-1zf28ssbrg

  • MD5

    db1dd32793b19815b844cc82b1743267

  • SHA1

    92846b4e6c9bc160c87e8e8592ebfa2c0ebccd51

  • SHA256

    b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1

  • SHA512

    6d565d3a30bd4c474aec4ae2cff14282e54fcf7312359fc9738af151441efcc832d5510c097ddb0472efaa0d7bb7b483affdd0216b904899ae2ba2a97efd3ff7

  • SSDEEP

    98304:p8/e8SNdaUd2Zr5OLfsp8f+A8JnhvExbpC8w3P:Xrnes+BnFEbq

Malware Config

Targets

    • Target

      b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1.bin

    • Size

      3.5MB

    • MD5

      db1dd32793b19815b844cc82b1743267

    • SHA1

      92846b4e6c9bc160c87e8e8592ebfa2c0ebccd51

    • SHA256

      b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1

    • SHA512

      6d565d3a30bd4c474aec4ae2cff14282e54fcf7312359fc9738af151441efcc832d5510c097ddb0472efaa0d7bb7b483affdd0216b904899ae2ba2a97efd3ff7

    • SSDEEP

      98304:p8/e8SNdaUd2Zr5OLfsp8f+A8JnhvExbpC8w3P:Xrnes+BnFEbq

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks