General

  • Target

    0754d99403d4bad79a691227d144cf075398b086d61e0aebd9ccda9191f7d19b.bin

  • Size

    4.0MB

  • Sample

    240629-1z9dsa1cln

  • MD5

    eb735c3f6e79ae0e59a0ddcdafbaa207

  • SHA1

    75dd9f887b35e16b9c3e4a7f4d3d0afd648aa3b6

  • SHA256

    0754d99403d4bad79a691227d144cf075398b086d61e0aebd9ccda9191f7d19b

  • SHA512

    e65f6a0f25afeaf247624d5b2f093adb411f8d4344ac44bff6bea1fb22cb120631e77599d903d87aecd801824b78b2f9d9768b1073d2696d3b6ebc4f7eab0ea9

  • SSDEEP

    98304:JUnM04VmwvCFdiWsXXmSLuw6qJeVnOuAVZtb2ICsIvojrrL5/:wM0emOGdiWsXWeuwnJeVnO5VCsIvC5/

Malware Config

Targets

    • Target

      0754d99403d4bad79a691227d144cf075398b086d61e0aebd9ccda9191f7d19b.bin

    • Size

      4.0MB

    • MD5

      eb735c3f6e79ae0e59a0ddcdafbaa207

    • SHA1

      75dd9f887b35e16b9c3e4a7f4d3d0afd648aa3b6

    • SHA256

      0754d99403d4bad79a691227d144cf075398b086d61e0aebd9ccda9191f7d19b

    • SHA512

      e65f6a0f25afeaf247624d5b2f093adb411f8d4344ac44bff6bea1fb22cb120631e77599d903d87aecd801824b78b2f9d9768b1073d2696d3b6ebc4f7eab0ea9

    • SSDEEP

      98304:JUnM04VmwvCFdiWsXXmSLuw6qJeVnOuAVZtb2ICsIvojrrL5/:wM0emOGdiWsXWeuwnJeVnO5VCsIvC5/

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Matrix

Tasks