General

  • Target

    b82631ef994561ec601a28d4caf2da14ed6d39d96b5ddd3fe98418971ba1206cN.zip

  • Size

    3.7MB

  • Sample

    250104-c1fabsyphk

  • MD5

    54fcd493cc7f0aebb4bdc06e02d0e520

  • SHA1

    35eb554ef89db898666e7028df1b313ce9823ca1

  • SHA256

    b82631ef994561ec601a28d4caf2da14ed6d39d96b5ddd3fe98418971ba1206c

  • SHA512

    65057b3be1745f9369ae632c96b9f1da458b86211ec79c0388c0b957d02375a555234ad01b4f48b888db6ae2dbbd8b196b71ddafb188ed15b87b0fe11007be89

  • SSDEEP

    98304:obXP1b29WtW4vehyNY5k2uXxn+Gxu9nwsl2mh:orGWbve8NWZuXxnw9nwsbh

Malware Config

Targets

    • Target

      b82631ef994561ec601a28d4caf2da14ed6d39d96b5ddd3fe98418971ba1206cN.zip

    • Size

      3.7MB

    • MD5

      54fcd493cc7f0aebb4bdc06e02d0e520

    • SHA1

      35eb554ef89db898666e7028df1b313ce9823ca1

    • SHA256

      b82631ef994561ec601a28d4caf2da14ed6d39d96b5ddd3fe98418971ba1206c

    • SHA512

      65057b3be1745f9369ae632c96b9f1da458b86211ec79c0388c0b957d02375a555234ad01b4f48b888db6ae2dbbd8b196b71ddafb188ed15b87b0fe11007be89

    • SSDEEP

      98304:obXP1b29WtW4vehyNY5k2uXxn+Gxu9nwsl2mh:orGWbve8NWZuXxnw9nwsbh

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks