General

  • Target

    a9632891f4aaebcb9f3a3abed8d9791e933f51c7fa83e3a1e61608c56c0f7a79.bin

  • Size

    4.3MB

  • Sample

    241011-14lhhs1fmk

  • MD5

    7707457457be2800d3d43cad46b829f1

  • SHA1

    6118aa37a88e73e47f85a7eebba25bb7c48a22e1

  • SHA256

    a9632891f4aaebcb9f3a3abed8d9791e933f51c7fa83e3a1e61608c56c0f7a79

  • SHA512

    988e398aef7d67097b9f4fc71c7a7f5e96e8dffd7c167afb21d53317f8fe5a04fb84704369860c8e4853cf8e09de79a634abfa5a93f975fe9beeec2acd63a79f

  • SSDEEP

    98304:j9UxE1x8BDAVwzH4rzEcjkoZTbV15DwfJ/9RMEuQkaXBJSgEHds/:rH8BtzH4HF/ZTtwh/kEuQFXmgUs/

Malware Config

Targets

    • Target

      a9632891f4aaebcb9f3a3abed8d9791e933f51c7fa83e3a1e61608c56c0f7a79.bin

    • Size

      4.3MB

    • MD5

      7707457457be2800d3d43cad46b829f1

    • SHA1

      6118aa37a88e73e47f85a7eebba25bb7c48a22e1

    • SHA256

      a9632891f4aaebcb9f3a3abed8d9791e933f51c7fa83e3a1e61608c56c0f7a79

    • SHA512

      988e398aef7d67097b9f4fc71c7a7f5e96e8dffd7c167afb21d53317f8fe5a04fb84704369860c8e4853cf8e09de79a634abfa5a93f975fe9beeec2acd63a79f

    • SSDEEP

      98304:j9UxE1x8BDAVwzH4rzEcjkoZTbV15DwfJ/9RMEuQkaXBJSgEHds/:rH8BtzH4HF/ZTtwh/kEuQFXmgUs/

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks