General

  • Target

    0505be6f429fe4941991d6fec86f1b7fe3eda3f9db3f8c954a5bdffd42c1c06b.bin

  • Size

    2.6MB

  • Sample

    250403-11btxaxnx6

  • MD5

    770f0a962d9f4e5174651d88a6d50fad

  • SHA1

    2f938610f8016ab86172f25bf7856df990523a5b

  • SHA256

    0505be6f429fe4941991d6fec86f1b7fe3eda3f9db3f8c954a5bdffd42c1c06b

  • SHA512

    02ec06fc4121b10aa8edd1e1f4d3486338e3e73328848c77b7917dfd98a4b4e3fee9222c3f09f9bd5787952115f9a13c34c4247d26c626036f7656fe67a510c0

  • SSDEEP

    24576:G4m51+WtE0Ee93y/29339YPa8UGYqRpv+crRy5vstKctS3WCHUC2aFZee:9JWu0n9l9X8UGL5r/RtS3WVCjee

Malware Config

Targets

    • Target

      0505be6f429fe4941991d6fec86f1b7fe3eda3f9db3f8c954a5bdffd42c1c06b.bin

    • Size

      2.6MB

    • MD5

      770f0a962d9f4e5174651d88a6d50fad

    • SHA1

      2f938610f8016ab86172f25bf7856df990523a5b

    • SHA256

      0505be6f429fe4941991d6fec86f1b7fe3eda3f9db3f8c954a5bdffd42c1c06b

    • SHA512

      02ec06fc4121b10aa8edd1e1f4d3486338e3e73328848c77b7917dfd98a4b4e3fee9222c3f09f9bd5787952115f9a13c34c4247d26c626036f7656fe67a510c0

    • SSDEEP

      24576:G4m51+WtE0Ee93y/29339YPa8UGYqRpv+crRy5vstKctS3WCHUC2aFZee:9JWu0n9l9X8UGL5r/RtS3WVCjee

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks