General

  • Target

    5d68eb5a470eae9dbb84fa2f0ceecc07f79bff91262b95bfe2798ae406fc833a.bin

  • Size

    1.7MB

  • Sample

    241104-13gg6syfjk

  • MD5

    2fc7688f2c86791c628bd2ec7151849b

  • SHA1

    9d15fef1155e534806f145988c88bb969501f4f0

  • SHA256

    5d68eb5a470eae9dbb84fa2f0ceecc07f79bff91262b95bfe2798ae406fc833a

  • SHA512

    310173669fe0fb704ad2d47f08d309e080dd7e05d29eb672abb12cd0722f8d5a7d8bc187b36fe4ef54ca380a9d7ddd17b5888d96e1c4c7431a2bdb091a17f40b

  • SSDEEP

    24576:wLjJm51ruvLIqP9l0nGWl9LTN6O9v/p27QL14m51+WtE0HFa9fp:gjJm3YbP9inGWn5rvkMLGJWu0Oh

Malware Config

Targets

    • Target

      5d68eb5a470eae9dbb84fa2f0ceecc07f79bff91262b95bfe2798ae406fc833a.bin

    • Size

      1.7MB

    • MD5

      2fc7688f2c86791c628bd2ec7151849b

    • SHA1

      9d15fef1155e534806f145988c88bb969501f4f0

    • SHA256

      5d68eb5a470eae9dbb84fa2f0ceecc07f79bff91262b95bfe2798ae406fc833a

    • SHA512

      310173669fe0fb704ad2d47f08d309e080dd7e05d29eb672abb12cd0722f8d5a7d8bc187b36fe4ef54ca380a9d7ddd17b5888d96e1c4c7431a2bdb091a17f40b

    • SSDEEP

      24576:wLjJm51ruvLIqP9l0nGWl9LTN6O9v/p27QL14m51+WtE0HFa9fp:gjJm3YbP9inGWn5rvkMLGJWu0Oh

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks