General

  • Target

    b5347714c46a9c3b6eb2100847f7c431580920b59262f9bced6439a9f37e8e53.bin

  • Size

    2.1MB

  • Sample

    241108-2qtsea1kbz

  • MD5

    bc73b0ff59b059700983d97c09655b67

  • SHA1

    c68cacf0a26c1982dd2efd62745c32ff7193c9e7

  • SHA256

    b5347714c46a9c3b6eb2100847f7c431580920b59262f9bced6439a9f37e8e53

  • SHA512

    a1e1bd39178381456213979b1fc443e1697be8f514ccacd51560df78c9309f088154947c655824136d5991f001510d0d667c1bd41465ebd8a9d326d19ceb5683

  • SSDEEP

    24576:z17U/5iAWYxQBgcXCc/aei7YRF9jIO/ZBsYWha4m51+WtE0rTsDMI4gS571eY:x7U/SmkzPC8NsQjsYCJWu0rTPgS5Jp

Malware Config

Targets

    • Target

      b5347714c46a9c3b6eb2100847f7c431580920b59262f9bced6439a9f37e8e53.bin

    • Size

      2.1MB

    • MD5

      bc73b0ff59b059700983d97c09655b67

    • SHA1

      c68cacf0a26c1982dd2efd62745c32ff7193c9e7

    • SHA256

      b5347714c46a9c3b6eb2100847f7c431580920b59262f9bced6439a9f37e8e53

    • SHA512

      a1e1bd39178381456213979b1fc443e1697be8f514ccacd51560df78c9309f088154947c655824136d5991f001510d0d667c1bd41465ebd8a9d326d19ceb5683

    • SSDEEP

      24576:z17U/5iAWYxQBgcXCc/aei7YRF9jIO/ZBsYWha4m51+WtE0rTsDMI4gS571eY:x7U/SmkzPC8NsQjsYCJWu0rTPgS5Jp

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks