General

  • Target

    3a36b482f8e5c8095b578e8fba131ba68f9143c8f7328a3d824295c34e9bea06.bin

  • Size

    2.6MB

  • Sample

    250216-1y75bszngp

  • MD5

    1479701713461763120868530052b08f

  • SHA1

    149ed89fc14e9f0add4eeffdd3623d2d6eb161e7

  • SHA256

    3a36b482f8e5c8095b578e8fba131ba68f9143c8f7328a3d824295c34e9bea06

  • SHA512

    9cddf5e4564a2aeff22efe914ad10c45c19c02f50fe575f1379ba77a99e59f9e592c6ad09385c589742c1b40fdc646836afe329cb83e0fa891f10ddcd13adacb

  • SSDEEP

    24576:Z4m51+WtE0GCCe9NR5QNf2caFEd+hpUS3Zkr/1yaumJ8n0n6J4Yma4x:CJWu0GC3BlC+ky+Jmi

Malware Config

Targets

    • Target

      3a36b482f8e5c8095b578e8fba131ba68f9143c8f7328a3d824295c34e9bea06.bin

    • Size

      2.6MB

    • MD5

      1479701713461763120868530052b08f

    • SHA1

      149ed89fc14e9f0add4eeffdd3623d2d6eb161e7

    • SHA256

      3a36b482f8e5c8095b578e8fba131ba68f9143c8f7328a3d824295c34e9bea06

    • SHA512

      9cddf5e4564a2aeff22efe914ad10c45c19c02f50fe575f1379ba77a99e59f9e592c6ad09385c589742c1b40fdc646836afe329cb83e0fa891f10ddcd13adacb

    • SSDEEP

      24576:Z4m51+WtE0GCCe9NR5QNf2caFEd+hpUS3Zkr/1yaumJ8n0n6J4Yma4x:CJWu0GC3BlC+ky+Jmi

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks