General

  • Target

    88f427899e02ec6f4bf7dbcbf44c9f19d9427878f1ea9ff0379122af9c445d72.bin

  • Size

    2.6MB

  • Sample

    250328-13jbrstpy4

  • MD5

    a5b2d408ce441afcba549cc08fc84028

  • SHA1

    2d0065957e8ff46eb4f2c85f8c3c8d4e1a8f6c10

  • SHA256

    88f427899e02ec6f4bf7dbcbf44c9f19d9427878f1ea9ff0379122af9c445d72

  • SHA512

    dbfde69fc29415e3cac981179987b18af887daa9a3f09826525d611826b6f0e4b8c6b913b01228a38a8b3dc53628748618b2a802791497264ff7f44c5e9dd7a0

  • SSDEEP

    24576:2L4m51+WtE03dISnIZEse+3p1YOutX3xc+PJQR4/S2jHqULC8qCXbv9xcZPBQ9kh:7JWu0Geecn2AtUxTCWn

Malware Config

Targets

    • Target

      88f427899e02ec6f4bf7dbcbf44c9f19d9427878f1ea9ff0379122af9c445d72.bin

    • Size

      2.6MB

    • MD5

      a5b2d408ce441afcba549cc08fc84028

    • SHA1

      2d0065957e8ff46eb4f2c85f8c3c8d4e1a8f6c10

    • SHA256

      88f427899e02ec6f4bf7dbcbf44c9f19d9427878f1ea9ff0379122af9c445d72

    • SHA512

      dbfde69fc29415e3cac981179987b18af887daa9a3f09826525d611826b6f0e4b8c6b913b01228a38a8b3dc53628748618b2a802791497264ff7f44c5e9dd7a0

    • SSDEEP

      24576:2L4m51+WtE03dISnIZEse+3p1YOutX3xc+PJQR4/S2jHqULC8qCXbv9xcZPBQ9kh:7JWu0Geecn2AtUxTCWn

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks