General

  • Target

    e205a53437b758668018ffdb0732e56e7b76886e86f42e4f47deb350e38b11d9.bin

  • Size

    2.6MB

  • Sample

    250328-13jyastpy5

  • MD5

    1135d069557982f37d42249340fb0bd0

  • SHA1

    6cc0a655e9749c91d7a5fe862813dabafd771e7e

  • SHA256

    e205a53437b758668018ffdb0732e56e7b76886e86f42e4f47deb350e38b11d9

  • SHA512

    9f1722bb12ba750b3bd5413897873054d8bc3daaffe6efff44b50ad6d018c36b742fa2fc79f88531d147b50f6cf42471bd8ed174ef36223961ba0cc12f016472

  • SSDEEP

    24576:r6lk4m51+WtE0P057IPeK1lhFdzlt7vGgOwvoqWFwRGer0GuMokDnuApvgkCPapj:mJWu0EQ1vJ4Ao8Ci

Malware Config

Targets

    • Target

      e205a53437b758668018ffdb0732e56e7b76886e86f42e4f47deb350e38b11d9.bin

    • Size

      2.6MB

    • MD5

      1135d069557982f37d42249340fb0bd0

    • SHA1

      6cc0a655e9749c91d7a5fe862813dabafd771e7e

    • SHA256

      e205a53437b758668018ffdb0732e56e7b76886e86f42e4f47deb350e38b11d9

    • SHA512

      9f1722bb12ba750b3bd5413897873054d8bc3daaffe6efff44b50ad6d018c36b742fa2fc79f88531d147b50f6cf42471bd8ed174ef36223961ba0cc12f016472

    • SSDEEP

      24576:r6lk4m51+WtE0P057IPeK1lhFdzlt7vGgOwvoqWFwRGer0GuMokDnuApvgkCPapj:mJWu0EQ1vJ4Ao8Ci

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks