General

  • Target

    d22f3e315cfe37f39eb29a731bafcf93af9962f232c277d9406a6480eac4e497.bin

  • Size

    4.3MB

  • Sample

    241011-14jnxswhne

  • MD5

    2ffaf30aec06a526840b27121cc94ee8

  • SHA1

    e62f487cecdcf0136c06e571c88201329363d6f8

  • SHA256

    d22f3e315cfe37f39eb29a731bafcf93af9962f232c277d9406a6480eac4e497

  • SHA512

    032aac160bff7830deba0da01d731617f20c2223d451aa26a14ba5fdf945d1cc35ff15c317740d00a2b2a0a830936e5c62f927794df97ead9f6f9bc609330040

  • SSDEEP

    98304:x9xxjex8cDAVeNWeN59FgBJnYe7pOPnid2QWeUSjOmjJKm5fnpzMyBGd91LeBdA:r48czNWeN2v7pVd2Q3L5JvpzzWL8A

Malware Config

Targets

    • Target

      d22f3e315cfe37f39eb29a731bafcf93af9962f232c277d9406a6480eac4e497.bin

    • Size

      4.3MB

    • MD5

      2ffaf30aec06a526840b27121cc94ee8

    • SHA1

      e62f487cecdcf0136c06e571c88201329363d6f8

    • SHA256

      d22f3e315cfe37f39eb29a731bafcf93af9962f232c277d9406a6480eac4e497

    • SHA512

      032aac160bff7830deba0da01d731617f20c2223d451aa26a14ba5fdf945d1cc35ff15c317740d00a2b2a0a830936e5c62f927794df97ead9f6f9bc609330040

    • SSDEEP

      98304:x9xxjex8cDAVeNWeN59FgBJnYe7pOPnid2QWeUSjOmjJKm5fnpzMyBGd91LeBdA:r48czNWeN2v7pVd2Q3L5JvpzzWL8A

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks