General

  • Target

    c1998f14fca321dbe1eaf0c5c42de5a5590aba71fa016d20dcacc7091ceb1b38.bin

  • Size

    2.6MB

  • Sample

    250327-14xwjs1mv3

  • MD5

    1ea511850e57bf882d47453bb2ec0cc2

  • SHA1

    c0a72a99f231144b5d8bcdeaeed4474d24bb130c

  • SHA256

    c1998f14fca321dbe1eaf0c5c42de5a5590aba71fa016d20dcacc7091ceb1b38

  • SHA512

    8661df843817e872ecd22ca1bc62fd3b095d85f020c4bb65b2fd86ddb95622dbf384af8c0ab6c5ba2fb071253c77700399cdbd7c22d5a045ef4f5fe4a9d47261

  • SSDEEP

    24576:Cj4m51+WtE0qCq4SNB+JxxuOt/+ZL6lLAXU9oOLc6+O5aW1YrSCBeza5j:XJWu0qCN+MxfA6+OsWuF

Malware Config

Targets

    • Target

      c1998f14fca321dbe1eaf0c5c42de5a5590aba71fa016d20dcacc7091ceb1b38.bin

    • Size

      2.6MB

    • MD5

      1ea511850e57bf882d47453bb2ec0cc2

    • SHA1

      c0a72a99f231144b5d8bcdeaeed4474d24bb130c

    • SHA256

      c1998f14fca321dbe1eaf0c5c42de5a5590aba71fa016d20dcacc7091ceb1b38

    • SHA512

      8661df843817e872ecd22ca1bc62fd3b095d85f020c4bb65b2fd86ddb95622dbf384af8c0ab6c5ba2fb071253c77700399cdbd7c22d5a045ef4f5fe4a9d47261

    • SSDEEP

      24576:Cj4m51+WtE0qCq4SNB+JxxuOt/+ZL6lLAXU9oOLc6+O5aW1YrSCBeza5j:XJWu0qCN+MxfA6+OsWuF

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks