General

  • Target

    8bb085cd4f9e0fc19300453431f34c73a3d70581311a73458e7e1f649aa0d7de.bin

  • Size

    2.0MB

  • Sample

    250102-1y2ybazqgq

  • MD5

    7daa18f74cf68fe5879a0f47cee23906

  • SHA1

    c619be075b0a65b30acbcd7e358f131649a0c91e

  • SHA256

    8bb085cd4f9e0fc19300453431f34c73a3d70581311a73458e7e1f649aa0d7de

  • SHA512

    8af375224f797136fed995426a0c72ce23068260741e367f586d84d3a65a7208cb40788a5f260b5aec93cad8d9e7cf2578b24bd817c919176153eeb4ae7dd632

  • SSDEEP

    49152:2Fgy37MtTYyJc/njDM1ae2ytfKZgciEb+wC+OgS9r:Ry37MtYyW3M1ae2ytfmFik+wFSr

Malware Config

Targets

    • Target

      8bb085cd4f9e0fc19300453431f34c73a3d70581311a73458e7e1f649aa0d7de.bin

    • Size

      2.0MB

    • MD5

      7daa18f74cf68fe5879a0f47cee23906

    • SHA1

      c619be075b0a65b30acbcd7e358f131649a0c91e

    • SHA256

      8bb085cd4f9e0fc19300453431f34c73a3d70581311a73458e7e1f649aa0d7de

    • SHA512

      8af375224f797136fed995426a0c72ce23068260741e367f586d84d3a65a7208cb40788a5f260b5aec93cad8d9e7cf2578b24bd817c919176153eeb4ae7dd632

    • SSDEEP

      49152:2Fgy37MtTYyJc/njDM1ae2ytfKZgciEb+wC+OgS9r:Ry37MtYyW3M1ae2ytfmFik+wFSr

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks