General

  • Target

    2dab95e12fbbbce24ed923fe8679802f244e93e2a07a8e8d07f9ecee327ee4db.bin

  • Size

    3.9MB

  • Sample

    250211-1wv2zssrdq

  • MD5

    b625bfcf0f79d1e4082d9bdb3d9e998c

  • SHA1

    f2bdeade0b3e5e1c0b718bdab9f1ee864285117e

  • SHA256

    2dab95e12fbbbce24ed923fe8679802f244e93e2a07a8e8d07f9ecee327ee4db

  • SHA512

    75a7b46dbf0a4cdb3fd2373aedb22fd94db42e51065a376cd0e6c95d8d461b51c62496a831886f8d8217370647803d831995dbfa5218bc3a33e9adcc49526d12

  • SSDEEP

    49152:/venUUP/H30EpETC4vRbHmRTlklvRwWca16yxqssz/N6fOkE1wgQhRuoY3kFlj07:/ve5kzTvKxWAbqOrwgQHnx0SHQ3dA7eX

Malware Config

Targets

    • Target

      2dab95e12fbbbce24ed923fe8679802f244e93e2a07a8e8d07f9ecee327ee4db.bin

    • Size

      3.9MB

    • MD5

      b625bfcf0f79d1e4082d9bdb3d9e998c

    • SHA1

      f2bdeade0b3e5e1c0b718bdab9f1ee864285117e

    • SHA256

      2dab95e12fbbbce24ed923fe8679802f244e93e2a07a8e8d07f9ecee327ee4db

    • SHA512

      75a7b46dbf0a4cdb3fd2373aedb22fd94db42e51065a376cd0e6c95d8d461b51c62496a831886f8d8217370647803d831995dbfa5218bc3a33e9adcc49526d12

    • SSDEEP

      49152:/venUUP/H30EpETC4vRbHmRTlklvRwWca16yxqssz/N6fOkE1wgQhRuoY3kFlj07:/ve5kzTvKxWAbqOrwgQHnx0SHQ3dA7eX

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks