General

  • Target

    4600ed5fc19e49b077f89cac19b186824274d79de2bbbc71ad0e4c9d380c5afa.bin

  • Size

    4.3MB

  • Sample

    241012-1ytlyaxhqn

  • MD5

    37092201b61fb30091dbca1a8488d49d

  • SHA1

    48396b6bd0afb497d603e948ab9ee22a40a53f37

  • SHA256

    4600ed5fc19e49b077f89cac19b186824274d79de2bbbc71ad0e4c9d380c5afa

  • SHA512

    29bbf302e70df704ce247f17e131d0ccc7b30cb4f074d1594b76bc9c094de522a714951ec0edba7de8c96013277ba86d8a22c370228fdd0984beab1fba263dc8

  • SSDEEP

    98304:T97xcax8xDAVXWpG7o67avJ1kwuwaOA98bUBvfv8KREJddW2+p9dWTGEud9:Y88xsWpGc6+M+A98KREDdW2odXEe9

Malware Config

Targets

    • Target

      4600ed5fc19e49b077f89cac19b186824274d79de2bbbc71ad0e4c9d380c5afa.bin

    • Size

      4.3MB

    • MD5

      37092201b61fb30091dbca1a8488d49d

    • SHA1

      48396b6bd0afb497d603e948ab9ee22a40a53f37

    • SHA256

      4600ed5fc19e49b077f89cac19b186824274d79de2bbbc71ad0e4c9d380c5afa

    • SHA512

      29bbf302e70df704ce247f17e131d0ccc7b30cb4f074d1594b76bc9c094de522a714951ec0edba7de8c96013277ba86d8a22c370228fdd0984beab1fba263dc8

    • SSDEEP

      98304:T97xcax8xDAVXWpG7o67avJ1kwuwaOA98bUBvfv8KREJddW2+p9dWTGEud9:Y88xsWpGc6+M+A98KREDdW2odXEe9

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks