General

  • Target

    13ba519f4882b55c6445bb2ee3b8d08e6c397bea378905d572b6414302469c3c.bin

  • Size

    2.1MB

  • Sample

    241114-139hystkgv

  • MD5

    e0c9c8de8050934d2a028ef12a72224d

  • SHA1

    75c0f4e038960b1896e9bbf9db5541d697792234

  • SHA256

    13ba519f4882b55c6445bb2ee3b8d08e6c397bea378905d572b6414302469c3c

  • SHA512

    04b5f5136207794cf973514103fba6c76b6f168496ad6a2a7d0415c354227dbe6de61dfc4486ea183e5e272bda859d0e506252d61152ef4eda3a6d9ba3d48716

  • SSDEEP

    49152:T7hp39jp11W45k3f+ruo5EngZJWu0LH3ggSYVB0l:T7hp3/18YkPQeGcLH5VB0l

Malware Config

Targets

    • Target

      13ba519f4882b55c6445bb2ee3b8d08e6c397bea378905d572b6414302469c3c.bin

    • Size

      2.1MB

    • MD5

      e0c9c8de8050934d2a028ef12a72224d

    • SHA1

      75c0f4e038960b1896e9bbf9db5541d697792234

    • SHA256

      13ba519f4882b55c6445bb2ee3b8d08e6c397bea378905d572b6414302469c3c

    • SHA512

      04b5f5136207794cf973514103fba6c76b6f168496ad6a2a7d0415c354227dbe6de61dfc4486ea183e5e272bda859d0e506252d61152ef4eda3a6d9ba3d48716

    • SSDEEP

      49152:T7hp39jp11W45k3f+ruo5EngZJWu0LH3ggSYVB0l:T7hp3/18YkPQeGcLH5VB0l

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks