General

  • Target

    47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f.bin

  • Size

    2.6MB

  • Sample

    250327-123zsa1lz2

  • MD5

    1033f8f55c4b53a464ebdcf1ffca0190

  • SHA1

    2aa52592ed476ffae97f1460435287dcb4e3a859

  • SHA256

    47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f

  • SHA512

    f99851883a97bf1386b7b7d1949a175c2173004baf62d24225e82ec6626c118e68c4d4bf8b4a066a76bdb98f7858e6592c7d852cf8daefed909d58f93186ba2d

  • SSDEEP

    24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CL0W9:4JWu0Oe9YYcgNNddSvCLt

Malware Config

Targets

    • Target

      47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f.bin

    • Size

      2.6MB

    • MD5

      1033f8f55c4b53a464ebdcf1ffca0190

    • SHA1

      2aa52592ed476ffae97f1460435287dcb4e3a859

    • SHA256

      47db1877603efa9ff5ca02bba0d717b30c642db5b14346b4115fb7e3db1fdb2f

    • SHA512

      f99851883a97bf1386b7b7d1949a175c2173004baf62d24225e82ec6626c118e68c4d4bf8b4a066a76bdb98f7858e6592c7d852cf8daefed909d58f93186ba2d

    • SSDEEP

      24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CL0W9:4JWu0Oe9YYcgNNddSvCLt

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks