General
-
Target
b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1.bin
-
Size
3.5MB
-
Sample
240916-1zf28ssbrg
-
MD5
db1dd32793b19815b844cc82b1743267
-
SHA1
92846b4e6c9bc160c87e8e8592ebfa2c0ebccd51
-
SHA256
b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1
-
SHA512
6d565d3a30bd4c474aec4ae2cff14282e54fcf7312359fc9738af151441efcc832d5510c097ddb0472efaa0d7bb7b483affdd0216b904899ae2ba2a97efd3ff7
-
SSDEEP
98304:p8/e8SNdaUd2Zr5OLfsp8f+A8JnhvExbpC8w3P:Xrnes+BnFEbq
Static task
static1
Behavioral task
behavioral1
Sample
b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1.bin
-
Size
3.5MB
-
MD5
db1dd32793b19815b844cc82b1743267
-
SHA1
92846b4e6c9bc160c87e8e8592ebfa2c0ebccd51
-
SHA256
b2639b2e361d34e3578ae6ae64de93797ffd05a43973fa679f8b75ca31af1ac1
-
SHA512
6d565d3a30bd4c474aec4ae2cff14282e54fcf7312359fc9738af151441efcc832d5510c097ddb0472efaa0d7bb7b483affdd0216b904899ae2ba2a97efd3ff7
-
SSDEEP
98304:p8/e8SNdaUd2Zr5OLfsp8f+A8JnhvExbpC8w3P:Xrnes+BnFEbq
-
Android SoumniBot payload
-
SoumniBot
SoumniBot is an Android banking trojan first seen in April 2024.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-