General

  • Target

    2d1ba3645ef1184ee10e685ae22cc5413f14502061042104a05e3ce3e218a7d1.bin

  • Size

    2.6MB

  • Sample

    250327-15bppsyxhw

  • MD5

    ae7f930fc7a467769ebc58b088e88169

  • SHA1

    be4862ea8d4eb700425fd9ea53778dfc42b0b141

  • SHA256

    2d1ba3645ef1184ee10e685ae22cc5413f14502061042104a05e3ce3e218a7d1

  • SHA512

    08f264d91cb29fe851ba170f610c3171fdf598baf83493a63f0be6118b041d199b3159cf31bba8527c736b85567c94042c6859caff5aa7be65eba8554e02e2cb

  • SSDEEP

    24576:Lf4m51+WtE0K24sCMi+mouORWSzrOh984wOn++HoW1xjV0KifXLCO5Qy:LAJWu08sChLwO+WDjV0KobCOb

Malware Config

Targets

    • Target

      2d1ba3645ef1184ee10e685ae22cc5413f14502061042104a05e3ce3e218a7d1.bin

    • Size

      2.6MB

    • MD5

      ae7f930fc7a467769ebc58b088e88169

    • SHA1

      be4862ea8d4eb700425fd9ea53778dfc42b0b141

    • SHA256

      2d1ba3645ef1184ee10e685ae22cc5413f14502061042104a05e3ce3e218a7d1

    • SHA512

      08f264d91cb29fe851ba170f610c3171fdf598baf83493a63f0be6118b041d199b3159cf31bba8527c736b85567c94042c6859caff5aa7be65eba8554e02e2cb

    • SSDEEP

      24576:Lf4m51+WtE0K24sCMi+mouORWSzrOh984wOn++HoW1xjV0KifXLCO5Qy:LAJWu08sChLwO+WDjV0KobCOb

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks