General

  • Target

    0840c9c814632bc4f108190976182f5eb64ad895b1dd2309ad88a94f7056fb6e.bin

  • Size

    4.6MB

  • Sample

    250328-13y28asth1

  • MD5

    94b4133b7af37607288c8297dc51f0a0

  • SHA1

    9647fb28abe3e0b4280c7c0c3619ec0efde28d09

  • SHA256

    0840c9c814632bc4f108190976182f5eb64ad895b1dd2309ad88a94f7056fb6e

  • SHA512

    e71518a4dc0c19125152c56d733a3a94edaaf061b11748cbacc41eed1eade0e636d862efac1c000ef7f3f72d8891e52f0ecbfbd753ff3f91616b1c66c928ec26

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2Cxj7f+9rusvQW4zFw:JcJGS+XY7f+9p/

Malware Config

Targets

    • Target

      0840c9c814632bc4f108190976182f5eb64ad895b1dd2309ad88a94f7056fb6e.bin

    • Size

      4.6MB

    • MD5

      94b4133b7af37607288c8297dc51f0a0

    • SHA1

      9647fb28abe3e0b4280c7c0c3619ec0efde28d09

    • SHA256

      0840c9c814632bc4f108190976182f5eb64ad895b1dd2309ad88a94f7056fb6e

    • SHA512

      e71518a4dc0c19125152c56d733a3a94edaaf061b11748cbacc41eed1eade0e636d862efac1c000ef7f3f72d8891e52f0ecbfbd753ff3f91616b1c66c928ec26

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2Cxj7f+9rusvQW4zFw:JcJGS+XY7f+9p/

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks