General

  • Target

    ac7619982b640793daa7d61c3e161b49303125977f1774692e16f031ad9b30ce.bin

  • Size

    2.1MB

  • Sample

    241006-13naqaydqm

  • MD5

    e3a1dc8cda6bf4c6599daab3ad24dec2

  • SHA1

    2e7c31a0f8c03d908ddb42c97ad263c2879df076

  • SHA256

    ac7619982b640793daa7d61c3e161b49303125977f1774692e16f031ad9b30ce

  • SHA512

    5d7bad66acba035a3655d76f6cb2298d574f34d99740d60d88ea5682fecc75044c6816e9c2d81607e7c7070d9cd95e76257c63c42dce5ae14615a2a323e9e0d5

  • SSDEEP

    49152:r757ed9ce56eNlqMjF5KCkrg0jVPL2aJWu0a1V+AiB:r75q/ce56GXF5KCJOcatiB

Malware Config

Targets

    • Target

      ac7619982b640793daa7d61c3e161b49303125977f1774692e16f031ad9b30ce.bin

    • Size

      2.1MB

    • MD5

      e3a1dc8cda6bf4c6599daab3ad24dec2

    • SHA1

      2e7c31a0f8c03d908ddb42c97ad263c2879df076

    • SHA256

      ac7619982b640793daa7d61c3e161b49303125977f1774692e16f031ad9b30ce

    • SHA512

      5d7bad66acba035a3655d76f6cb2298d574f34d99740d60d88ea5682fecc75044c6816e9c2d81607e7c7070d9cd95e76257c63c42dce5ae14615a2a323e9e0d5

    • SSDEEP

      49152:r757ed9ce56eNlqMjF5KCkrg0jVPL2aJWu0a1V+AiB:r75q/ce56GXF5KCJOcatiB

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks