General

  • Target

    e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717.bin

  • Size

    2.6MB

  • Sample

    250403-11d92avwcx

  • MD5

    b27596da50c60b9ae7d30e217ab31fbf

  • SHA1

    6ea5ee006bfffb37fc93fc636c263d577171ce00

  • SHA256

    e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717

  • SHA512

    34f2adc5fa916c280cb1727a8e96a4a2bd602fa8444314cb56ed7a18d4fa8ce4e7d8aee1b7cf0199f3ded5bd26673dfcda0fdbb8bad4f1f890694e8859674348

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCVaki:RJWu0L8+mQbphVKeUuC4

Malware Config

Targets

    • Target

      e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717.bin

    • Size

      2.6MB

    • MD5

      b27596da50c60b9ae7d30e217ab31fbf

    • SHA1

      6ea5ee006bfffb37fc93fc636c263d577171ce00

    • SHA256

      e5fe336ea5bed0a281e4ee21cf8d59ba450171bfd639b7962aa6c5b7f51ea717

    • SHA512

      34f2adc5fa916c280cb1727a8e96a4a2bd602fa8444314cb56ed7a18d4fa8ce4e7d8aee1b7cf0199f3ded5bd26673dfcda0fdbb8bad4f1f890694e8859674348

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCVaki:RJWu0L8+mQbphVKeUuC4

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks