General

  • Target

    f9edfeb888b82088bd627dbb30d79b5b0d2e2d91b8b80df2e8e68fd1f44ecf3d.bin

  • Size

    2.6MB

  • Sample

    250327-13tsha1l15

  • MD5

    0f25ab915a7e39ead12d2d8881b98086

  • SHA1

    d916f34d43f32d101cbc82f3e86878a5c53fe9b6

  • SHA256

    f9edfeb888b82088bd627dbb30d79b5b0d2e2d91b8b80df2e8e68fd1f44ecf3d

  • SHA512

    c91d997596990f75b4ff6bbff0e42c0dea2a6b0d8956717c508375842b6312e17fbdb3759b292e2e99023efcfc56f440dc30c9c3c9942b00c56a34ac167f3568

  • SSDEEP

    24576:m1b4m51+WtE0mbzIemQZ088sJcA470ieA45RqTbpOjPprmpT83Dyqdn0Ab3Xbi9E:m6JWu0tQZL0Hs4pPGwCw6

Malware Config

Targets

    • Target

      f9edfeb888b82088bd627dbb30d79b5b0d2e2d91b8b80df2e8e68fd1f44ecf3d.bin

    • Size

      2.6MB

    • MD5

      0f25ab915a7e39ead12d2d8881b98086

    • SHA1

      d916f34d43f32d101cbc82f3e86878a5c53fe9b6

    • SHA256

      f9edfeb888b82088bd627dbb30d79b5b0d2e2d91b8b80df2e8e68fd1f44ecf3d

    • SHA512

      c91d997596990f75b4ff6bbff0e42c0dea2a6b0d8956717c508375842b6312e17fbdb3759b292e2e99023efcfc56f440dc30c9c3c9942b00c56a34ac167f3568

    • SSDEEP

      24576:m1b4m51+WtE0mbzIemQZ088sJcA470ieA45RqTbpOjPprmpT83Dyqdn0Ab3Xbi9E:m6JWu0tQZL0Hs4pPGwCw6

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks