General

  • Target

    5fe381e404210621b03a64d587b18e37f9c8ef0b1c55336633b5ce2ac9767ae7.bin

  • Size

    2.6MB

  • Sample

    250403-11cffaxnx7

  • MD5

    9dcfb7f4bbf9445e264cd91be9a473bd

  • SHA1

    9c0cacab69c66f2250296b1553d9098171e2dc77

  • SHA256

    5fe381e404210621b03a64d587b18e37f9c8ef0b1c55336633b5ce2ac9767ae7

  • SHA512

    1058f751c85c3ffc1d298a4c897d0b9be77ba8f3f1e178fc8cbbb5a21b0ab8a562aa77ef8f77239678484475ef4b3b482a6f563c5b5453dc2d8bcfbec2d04158

  • SSDEEP

    24576:c4m51+WtE0l7YXH94otRdb8hDlXKYP5FOFZWlsnYgfoCMOY:rJWu0l7I/YPWWinYpCMz

Malware Config

Targets

    • Target

      5fe381e404210621b03a64d587b18e37f9c8ef0b1c55336633b5ce2ac9767ae7.bin

    • Size

      2.6MB

    • MD5

      9dcfb7f4bbf9445e264cd91be9a473bd

    • SHA1

      9c0cacab69c66f2250296b1553d9098171e2dc77

    • SHA256

      5fe381e404210621b03a64d587b18e37f9c8ef0b1c55336633b5ce2ac9767ae7

    • SHA512

      1058f751c85c3ffc1d298a4c897d0b9be77ba8f3f1e178fc8cbbb5a21b0ab8a562aa77ef8f77239678484475ef4b3b482a6f563c5b5453dc2d8bcfbec2d04158

    • SSDEEP

      24576:c4m51+WtE0l7YXH94otRdb8hDlXKYP5FOFZWlsnYgfoCMOY:rJWu0l7I/YPWWinYpCMz

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks