General

  • Target

    d978d7616a104438e2a998baac6ca57513938c76dd92c867e4f5669711fca42a.bin

  • Size

    1.5MB

  • Sample

    250327-14sxlayxe1

  • MD5

    98d31719fea6c3fe19b6ec0425755be3

  • SHA1

    df498e2e49c221cca0ae51cfc3bdaa03eb84c6e4

  • SHA256

    d978d7616a104438e2a998baac6ca57513938c76dd92c867e4f5669711fca42a

  • SHA512

    0f7df492372fd2c78a068669dc07db1785eb2cdadadf648023a79890721616d471ec93555cbabfd319a6c47b7b16d6c7e0758e5c4876329735a6292aecb499d2

  • SSDEEP

    24576:oWX4m51+WtE0RmQte6EtJTzJs/RqpoPv3vYmYZZ18MelS39As:otJWu0RPbACPKiMYSNAs

Malware Config

Targets

    • Target

      d978d7616a104438e2a998baac6ca57513938c76dd92c867e4f5669711fca42a.bin

    • Size

      1.5MB

    • MD5

      98d31719fea6c3fe19b6ec0425755be3

    • SHA1

      df498e2e49c221cca0ae51cfc3bdaa03eb84c6e4

    • SHA256

      d978d7616a104438e2a998baac6ca57513938c76dd92c867e4f5669711fca42a

    • SHA512

      0f7df492372fd2c78a068669dc07db1785eb2cdadadf648023a79890721616d471ec93555cbabfd319a6c47b7b16d6c7e0758e5c4876329735a6292aecb499d2

    • SSDEEP

      24576:oWX4m51+WtE0RmQte6EtJTzJs/RqpoPv3vYmYZZ18MelS39As:otJWu0RPbACPKiMYSNAs

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks