General

  • Target

    4d9f0a47d8df14b5b7dc95e1f6f72886d78962fe470065d2668e873a449d96a1.bin

  • Size

    2.6MB

  • Sample

    250328-12v9yastgs

  • MD5

    e849d2f1744e9a1c1101f1c7a929d0ea

  • SHA1

    9aef51de570f09244b708dfd6270c26e7615bee6

  • SHA256

    4d9f0a47d8df14b5b7dc95e1f6f72886d78962fe470065d2668e873a449d96a1

  • SHA512

    8fdb9d0b2ef12ea7063b79afd6725aee6e7cc0d16de587973383acd4fd5c5fd8794f299e0ba0f6fb8473bd93866d86359f9cfd68d55f3c2383067bdbded0ebba

  • SSDEEP

    24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CYl1:4JWu0Oe9YYcgNNddSvCYT

Malware Config

Targets

    • Target

      4d9f0a47d8df14b5b7dc95e1f6f72886d78962fe470065d2668e873a449d96a1.bin

    • Size

      2.6MB

    • MD5

      e849d2f1744e9a1c1101f1c7a929d0ea

    • SHA1

      9aef51de570f09244b708dfd6270c26e7615bee6

    • SHA256

      4d9f0a47d8df14b5b7dc95e1f6f72886d78962fe470065d2668e873a449d96a1

    • SHA512

      8fdb9d0b2ef12ea7063b79afd6725aee6e7cc0d16de587973383acd4fd5c5fd8794f299e0ba0f6fb8473bd93866d86359f9cfd68d55f3c2383067bdbded0ebba

    • SSDEEP

      24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CYl1:4JWu0Oe9YYcgNNddSvCYT

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks