General

  • Target

    5f8943e99a296799728bbc11b7e3aeb91691f19e1e5e04151f526ba134ae271d.bin

  • Size

    4.2MB

  • Sample

    241011-14kwzs1flr

  • MD5

    464b62b1ac6bd1bab8ff2e369fc12baf

  • SHA1

    36a8ad5ead83ac3a99346c2286506d98f5c42635

  • SHA256

    5f8943e99a296799728bbc11b7e3aeb91691f19e1e5e04151f526ba134ae271d

  • SHA512

    8d1a8536b39a33d8c94bc5eb493996b9cc4ed041e7f42f056147c319cf05519cdf8498ea196427daba53d7c65a4583f2b14a6ffa483390707df68ebea5b43de7

  • SSDEEP

    98304:Q9zxAfx8uDAV7ekHWsGAtTbSfCsZ970K4Ow5GPU3+1Jd9QH:1J8uaek2sG6Gq42mv1T9QH

Malware Config

Targets

    • Target

      5f8943e99a296799728bbc11b7e3aeb91691f19e1e5e04151f526ba134ae271d.bin

    • Size

      4.2MB

    • MD5

      464b62b1ac6bd1bab8ff2e369fc12baf

    • SHA1

      36a8ad5ead83ac3a99346c2286506d98f5c42635

    • SHA256

      5f8943e99a296799728bbc11b7e3aeb91691f19e1e5e04151f526ba134ae271d

    • SHA512

      8d1a8536b39a33d8c94bc5eb493996b9cc4ed041e7f42f056147c319cf05519cdf8498ea196427daba53d7c65a4583f2b14a6ffa483390707df68ebea5b43de7

    • SSDEEP

      98304:Q9zxAfx8uDAV7ekHWsGAtTbSfCsZ970K4Ow5GPU3+1Jd9QH:1J8uaek2sG6Gq42mv1T9QH

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks