General

  • Target

    41e6a34e85a40cbe8036c3e3d94ad4211113bf46b8198d13cc0a8068b66046b4.bin

  • Size

    4.6MB

  • Sample

    250328-13sv7stpz3

  • MD5

    f5d0d03ae1b183be41325a4e30780ad0

  • SHA1

    4334bca23ab1c692889863017ae9d893d4e55974

  • SHA256

    41e6a34e85a40cbe8036c3e3d94ad4211113bf46b8198d13cc0a8068b66046b4

  • SHA512

    97375e3d0c20fb3ff27286fa8870d8ee8a557e3ff3191639474cc8293049b7ad64e76bcfccae84264bb03859f9f87f491bf3daebccb80b99920f0b9c413616fb

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2CnByf+9rusvQW4zFG:JcJGS+XQyf+9pH

Malware Config

Targets

    • Target

      41e6a34e85a40cbe8036c3e3d94ad4211113bf46b8198d13cc0a8068b66046b4.bin

    • Size

      4.6MB

    • MD5

      f5d0d03ae1b183be41325a4e30780ad0

    • SHA1

      4334bca23ab1c692889863017ae9d893d4e55974

    • SHA256

      41e6a34e85a40cbe8036c3e3d94ad4211113bf46b8198d13cc0a8068b66046b4

    • SHA512

      97375e3d0c20fb3ff27286fa8870d8ee8a557e3ff3191639474cc8293049b7ad64e76bcfccae84264bb03859f9f87f491bf3daebccb80b99920f0b9c413616fb

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2CnByf+9rusvQW4zFG:JcJGS+XQyf+9pH

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks