General

  • Target

    99bc71635288a4b3c1b89938917c26e52352a96f4f8ea727bd35d2cd3bc3f072.bin

  • Size

    2.6MB

  • Sample

    250209-1x42aatreq

  • MD5

    46248fdc3a70eb14e4c8c205ba226bc6

  • SHA1

    f653c68b452761a4fdef68916f6ee2ad8fdc028a

  • SHA256

    99bc71635288a4b3c1b89938917c26e52352a96f4f8ea727bd35d2cd3bc3f072

  • SHA512

    cd600762b71ee0190ad24aae35a50fcb8e8c52107dc622d33125d27e9d48e11d22129311d636121973720ba5459cc466c3e441ddb2738e506e3fae0c6a099657

  • SSDEEP

    24576:E4m51+WtE0tCtoQgh+zRnadKTmguavUTZmImS+ci2w6p4Ctj3jbB7q:jJWu0tC1nyguaqFi2w6pRttW

Malware Config

Targets

    • Target

      99bc71635288a4b3c1b89938917c26e52352a96f4f8ea727bd35d2cd3bc3f072.bin

    • Size

      2.6MB

    • MD5

      46248fdc3a70eb14e4c8c205ba226bc6

    • SHA1

      f653c68b452761a4fdef68916f6ee2ad8fdc028a

    • SHA256

      99bc71635288a4b3c1b89938917c26e52352a96f4f8ea727bd35d2cd3bc3f072

    • SHA512

      cd600762b71ee0190ad24aae35a50fcb8e8c52107dc622d33125d27e9d48e11d22129311d636121973720ba5459cc466c3e441ddb2738e506e3fae0c6a099657

    • SSDEEP

      24576:E4m51+WtE0tCtoQgh+zRnadKTmguavUTZmImS+ci2w6p4Ctj3jbB7q:jJWu0tC1nyguaqFi2w6pRttW

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks