General

  • Target

    57269694dd52f1a2ba397336c00708b2bd694618d61475217ec4e1aeedd6f2bd.bin

  • Size

    4.6MB

  • Sample

    250328-13r9nsstht

  • MD5

    4a8a82b154359e5a36442f7e4daaa0ea

  • SHA1

    f18ee68b172e035989ad956f5abfc9d9f8025090

  • SHA256

    57269694dd52f1a2ba397336c00708b2bd694618d61475217ec4e1aeedd6f2bd

  • SHA512

    c55536be1d42444ba30da63df65c100a0ad450c713192f757bb3e89e7ebcf1d28ade3f836ea93ac75e9304d2073922e581ce7b12a55829f1c728ecd4892d3468

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2C+Z7f+9rusvQW4zFJ:JcJGS+Xd7f+9pC

Malware Config

Targets

    • Target

      57269694dd52f1a2ba397336c00708b2bd694618d61475217ec4e1aeedd6f2bd.bin

    • Size

      4.6MB

    • MD5

      4a8a82b154359e5a36442f7e4daaa0ea

    • SHA1

      f18ee68b172e035989ad956f5abfc9d9f8025090

    • SHA256

      57269694dd52f1a2ba397336c00708b2bd694618d61475217ec4e1aeedd6f2bd

    • SHA512

      c55536be1d42444ba30da63df65c100a0ad450c713192f757bb3e89e7ebcf1d28ade3f836ea93ac75e9304d2073922e581ce7b12a55829f1c728ecd4892d3468

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2C+Z7f+9rusvQW4zFJ:JcJGS+Xd7f+9pC

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks