General

  • Target

    c49efe99a17bebdb3d5f228aeaca702a2fe1c91977008e31dc665f7a019cf19b.bin

  • Size

    4.3MB

  • Sample

    240928-12k4zaybln

  • MD5

    c89c7c179b7b839cc95490ef48d518bb

  • SHA1

    1d212eb3689aa8e8040c51f6271ff155b201702e

  • SHA256

    c49efe99a17bebdb3d5f228aeaca702a2fe1c91977008e31dc665f7a019cf19b

  • SHA512

    ceceefe754df2ca8475f256c1f51e6e0d095394c6d0cb139d82fb2ea46564ebde7b7fc0a4beeb6d0419b5fd5dc61d97491b29f5392ca780e037431c9ea0f658f

  • SSDEEP

    98304:ELwliXqbZ2EKi0uv8QYK8Ph/HrIVhpXfb25BDTajrrFjMr:ELkiqsHi09QY9hohkTOU

Malware Config

Targets

    • Target

      c49efe99a17bebdb3d5f228aeaca702a2fe1c91977008e31dc665f7a019cf19b.bin

    • Size

      4.3MB

    • MD5

      c89c7c179b7b839cc95490ef48d518bb

    • SHA1

      1d212eb3689aa8e8040c51f6271ff155b201702e

    • SHA256

      c49efe99a17bebdb3d5f228aeaca702a2fe1c91977008e31dc665f7a019cf19b

    • SHA512

      ceceefe754df2ca8475f256c1f51e6e0d095394c6d0cb139d82fb2ea46564ebde7b7fc0a4beeb6d0419b5fd5dc61d97491b29f5392ca780e037431c9ea0f658f

    • SSDEEP

      98304:ELwliXqbZ2EKi0uv8QYK8Ph/HrIVhpXfb25BDTajrrFjMr:ELkiqsHi09QY9hohkTOU

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks