General

  • Target

    4f7a1cb3091585380534577b614fcb8eb60f4d0d9a20d6badaba8dcdb356b315.bin

  • Size

    4.4MB

  • Sample

    241222-1zn3va1kfq

  • MD5

    420c8785707c35dd9ccd0ad194d6efd4

  • SHA1

    437c791abab6fae06ec8188a1d494142b02c393a

  • SHA256

    4f7a1cb3091585380534577b614fcb8eb60f4d0d9a20d6badaba8dcdb356b315

  • SHA512

    7756a1f557da055a0d77c40b11e6e115e0fcb62707067e4ee8409e7354980dc11630f05dd2bac799e4d48bfbdc8af4547927edfa0bc051568a28c86020128566

  • SSDEEP

    98304:OcSEGiIH9Q6ZB/cVicj3ab2BQlmLDOLqS73nE4J6jrrV:OcPGj9N/c3imLDOLqCdJu

Malware Config

Targets

    • Target

      4f7a1cb3091585380534577b614fcb8eb60f4d0d9a20d6badaba8dcdb356b315.bin

    • Size

      4.4MB

    • MD5

      420c8785707c35dd9ccd0ad194d6efd4

    • SHA1

      437c791abab6fae06ec8188a1d494142b02c393a

    • SHA256

      4f7a1cb3091585380534577b614fcb8eb60f4d0d9a20d6badaba8dcdb356b315

    • SHA512

      7756a1f557da055a0d77c40b11e6e115e0fcb62707067e4ee8409e7354980dc11630f05dd2bac799e4d48bfbdc8af4547927edfa0bc051568a28c86020128566

    • SSDEEP

      98304:OcSEGiIH9Q6ZB/cVicj3ab2BQlmLDOLqS73nE4J6jrrV:OcPGj9N/c3imLDOLqCdJu

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks