General

  • Target

    ed5c85ae82e887b27848a4cdd05d1679d8b0e3e1be4e784e46b71ff098986807.bin

  • Size

    3.0MB

  • Sample

    250203-1y43nsvncw

  • MD5

    1a1063d4076caef5df8d95eaf110afb8

  • SHA1

    7584fcae11cd5c8e9863b92c54fa52aa9914256e

  • SHA256

    ed5c85ae82e887b27848a4cdd05d1679d8b0e3e1be4e784e46b71ff098986807

  • SHA512

    ffc7e6f1c6061bf68c68304ed8dac388e3fce5afe00be99f9f3ad2754021a040f0edd9dd3a317317fd119356bfd169fa6ce4086972c9b564070ab6b12b13b68e

  • SSDEEP

    49152:LzwD+sNdJIYb5StjIjyGKQsL3TMBzU53esLN301jgRsP2ZrMT33:LtidtiEjyd9L3AOe8+JP2ZrMz3

Malware Config

Targets

    • Target

      ed5c85ae82e887b27848a4cdd05d1679d8b0e3e1be4e784e46b71ff098986807.bin

    • Size

      3.0MB

    • MD5

      1a1063d4076caef5df8d95eaf110afb8

    • SHA1

      7584fcae11cd5c8e9863b92c54fa52aa9914256e

    • SHA256

      ed5c85ae82e887b27848a4cdd05d1679d8b0e3e1be4e784e46b71ff098986807

    • SHA512

      ffc7e6f1c6061bf68c68304ed8dac388e3fce5afe00be99f9f3ad2754021a040f0edd9dd3a317317fd119356bfd169fa6ce4086972c9b564070ab6b12b13b68e

    • SSDEEP

      49152:LzwD+sNdJIYb5StjIjyGKQsL3TMBzU53esLN301jgRsP2ZrMT33:LtidtiEjyd9L3AOe8+JP2ZrMz3

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks