General

  • Target

    8cbe4de4efe567f82cd9b9f3e8ae17d16358ea75b922e8751a3a10041ba2a86c.bin

  • Size

    4.3MB

  • Sample

    241012-1yykwsxhrn

  • MD5

    bb674fd9f2770871b428df68361aa6e8

  • SHA1

    a254845f45d8d61978e55b3234d4804cee1f4c99

  • SHA256

    8cbe4de4efe567f82cd9b9f3e8ae17d16358ea75b922e8751a3a10041ba2a86c

  • SHA512

    e87c8970d358e420fed807b28f3a2b2aea8df501a19cdfc509ad1b768ad0ba304e0b847c3e3b073b5c8dc650b63c0914b6f23dadbd46a08058e62626c183213c

  • SSDEEP

    98304:s9xx34x8zDAV6hLTzVNkwlb0vFoVoBt2dyRKyNjNOnlwa6f/zGMtmhfdr:ki8zhhXzV+eo72+xpOjC2r

Malware Config

Targets

    • Target

      8cbe4de4efe567f82cd9b9f3e8ae17d16358ea75b922e8751a3a10041ba2a86c.bin

    • Size

      4.3MB

    • MD5

      bb674fd9f2770871b428df68361aa6e8

    • SHA1

      a254845f45d8d61978e55b3234d4804cee1f4c99

    • SHA256

      8cbe4de4efe567f82cd9b9f3e8ae17d16358ea75b922e8751a3a10041ba2a86c

    • SHA512

      e87c8970d358e420fed807b28f3a2b2aea8df501a19cdfc509ad1b768ad0ba304e0b847c3e3b073b5c8dc650b63c0914b6f23dadbd46a08058e62626c183213c

    • SSDEEP

      98304:s9xx34x8zDAV6hLTzVNkwlb0vFoVoBt2dyRKyNjNOnlwa6f/zGMtmhfdr:ki8zhhXzV+eo72+xpOjC2r

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks