General

  • Target

    5103554fd6b85ca5c1e54434d7a889aa17fb7d5f4afa38f92a2d728aabdcff76.bin

  • Size

    4.6MB

  • Sample

    250327-13n71s1lz6

  • MD5

    ada9135130e3480d95903a6635fa7a6a

  • SHA1

    5ef05858efc4a876204758279712b693a7d8eaaa

  • SHA256

    5103554fd6b85ca5c1e54434d7a889aa17fb7d5f4afa38f92a2d728aabdcff76

  • SHA512

    6f97323198f5f68cb29f3a837a727e3edeeb9c85d1e1cd18911796241e14af8b27ba77a14b774722d9335f94e32ffb5219fad5507175bdc52f794e95c6101a94

  • SSDEEP

    24576:kBP4m51+WtE02qQ/kiKl08btTMbYtSi9IwiWlsOCCcabUZXlujJg4Cpl2VxoK1TL:rJWu02cswaJabUZXl6CpqbDsBFt4Aot1

Malware Config

Targets

    • Target

      5103554fd6b85ca5c1e54434d7a889aa17fb7d5f4afa38f92a2d728aabdcff76.bin

    • Size

      4.6MB

    • MD5

      ada9135130e3480d95903a6635fa7a6a

    • SHA1

      5ef05858efc4a876204758279712b693a7d8eaaa

    • SHA256

      5103554fd6b85ca5c1e54434d7a889aa17fb7d5f4afa38f92a2d728aabdcff76

    • SHA512

      6f97323198f5f68cb29f3a837a727e3edeeb9c85d1e1cd18911796241e14af8b27ba77a14b774722d9335f94e32ffb5219fad5507175bdc52f794e95c6101a94

    • SSDEEP

      24576:kBP4m51+WtE02qQ/kiKl08btTMbYtSi9IwiWlsOCCcabUZXlujJg4Cpl2VxoK1TL:rJWu02cswaJabUZXl6CpqbDsBFt4Aot1

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks