General

  • Target

    4104f308c20a0f344a4659d25c808a9105a572893098c098f0199343f4f37bb3.bin

  • Size

    2.6MB

  • Sample

    250328-13znrasvas

  • MD5

    ccf1288271c0f4eac8ba0778ced06a29

  • SHA1

    aded11e7ae1e69eb3d7a87bd8aff35e2e4c70747

  • SHA256

    4104f308c20a0f344a4659d25c808a9105a572893098c098f0199343f4f37bb3

  • SHA512

    09ba6de064ba81b10a391f1e65921737adb7f436bea988fac42e4b0f2ea970ebecd05fa92e0d093377412c7f10d9ce03f5227755a4471636c97e0060b7d5a5b3

  • SSDEEP

    24576:2L4m51+WtE03dISnIZEse+3p1YOutX3xc+PJQR4/S2jHqULC8qCXbv9xcZPBQ9kr:7JWu0Geecn2AtUxTC5i

Malware Config

Targets

    • Target

      4104f308c20a0f344a4659d25c808a9105a572893098c098f0199343f4f37bb3.bin

    • Size

      2.6MB

    • MD5

      ccf1288271c0f4eac8ba0778ced06a29

    • SHA1

      aded11e7ae1e69eb3d7a87bd8aff35e2e4c70747

    • SHA256

      4104f308c20a0f344a4659d25c808a9105a572893098c098f0199343f4f37bb3

    • SHA512

      09ba6de064ba81b10a391f1e65921737adb7f436bea988fac42e4b0f2ea970ebecd05fa92e0d093377412c7f10d9ce03f5227755a4471636c97e0060b7d5a5b3

    • SSDEEP

      24576:2L4m51+WtE03dISnIZEse+3p1YOutX3xc+PJQR4/S2jHqULC8qCXbv9xcZPBQ9kr:7JWu0Geecn2AtUxTC5i

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks