General

  • Target

    5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8.bin

  • Size

    2.0MB

  • Sample

    241204-12l19szkar

  • MD5

    f7725b2e8cae7085e3d412f322515f09

  • SHA1

    218a07d8e4819b0e8e954d5c76c0f61bec2dc14e

  • SHA256

    5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8

  • SHA512

    77bc4911092a8d997f902778c269e5fbc152c0c001bebab3b549e6d761f36e5996583504a7ef4c62019faf8bc0523c7bb0aa15725930796261d08ff79f9c7912

  • SSDEEP

    49152:IOwe2ctvtW7kkGxJz2JWu0ZKsGHGgS/DR:Iv/wlFkYJz2cZK3H4d

Malware Config

Targets

    • Target

      5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8.bin

    • Size

      2.0MB

    • MD5

      f7725b2e8cae7085e3d412f322515f09

    • SHA1

      218a07d8e4819b0e8e954d5c76c0f61bec2dc14e

    • SHA256

      5a6b475a43d53a7034e316e3548c11fbf656cbb88a4f897d25d7242504448de8

    • SHA512

      77bc4911092a8d997f902778c269e5fbc152c0c001bebab3b549e6d761f36e5996583504a7ef4c62019faf8bc0523c7bb0aa15725930796261d08ff79f9c7912

    • SSDEEP

      49152:IOwe2ctvtW7kkGxJz2JWu0ZKsGHGgS/DR:Iv/wlFkYJz2cZK3H4d

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks