General

  • Target

    1c9d76686ad2e5b6a7311f76d94edbf6afd49ebf3aa8d5f37f1ae8dfa9ac4998.bin

  • Size

    2.6MB

  • Sample

    250328-13316ssvaw

  • MD5

    bc3176be014ab54f1695ac5bc1f5b4dd

  • SHA1

    fe2035d3bffafb9877eba4ce2e90498b29bce9b0

  • SHA256

    1c9d76686ad2e5b6a7311f76d94edbf6afd49ebf3aa8d5f37f1ae8dfa9ac4998

  • SHA512

    caf72c130f793eed29816f0a8b0efa1e139b651d1f67086b1e4de19dabb8b2afe69b2e7ef4ed11348bd6de8a82607ad51309dced95c145577906bbb9d575d61c

  • SSDEEP

    24576:NWS4m51+WtE09Bt4sgkdSUHqq22LyfuCSI8biYcAgJEotrD/7CUaK8:ERJWu0JReFXAgJztrC1

Malware Config

Targets

    • Target

      1c9d76686ad2e5b6a7311f76d94edbf6afd49ebf3aa8d5f37f1ae8dfa9ac4998.bin

    • Size

      2.6MB

    • MD5

      bc3176be014ab54f1695ac5bc1f5b4dd

    • SHA1

      fe2035d3bffafb9877eba4ce2e90498b29bce9b0

    • SHA256

      1c9d76686ad2e5b6a7311f76d94edbf6afd49ebf3aa8d5f37f1ae8dfa9ac4998

    • SHA512

      caf72c130f793eed29816f0a8b0efa1e139b651d1f67086b1e4de19dabb8b2afe69b2e7ef4ed11348bd6de8a82607ad51309dced95c145577906bbb9d575d61c

    • SSDEEP

      24576:NWS4m51+WtE09Bt4sgkdSUHqq22LyfuCSI8biYcAgJEotrD/7CUaK8:ERJWu0JReFXAgJztrC1

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks