General

  • Target

    49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01.bin

  • Size

    2.6MB

  • Sample

    250403-11dnhaxnx8

  • MD5

    706c06cc6f4ea9a1e9698543c0ef0917

  • SHA1

    1aae9c15fadcca7f1fca672a9155434a60bc3e7f

  • SHA256

    49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01

  • SHA512

    bfa93a82b4127742d333c94d72899e5ba8f9feb46a6d3dc7534f754b9dfcb32244416cd5d0312af8924dd99b63c7b4e07943885c83a51fe610b5561e80b5cac8

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCvaC6D:RJWu0L8+mQbphVKeUuCMD

Malware Config

Targets

    • Target

      49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01.bin

    • Size

      2.6MB

    • MD5

      706c06cc6f4ea9a1e9698543c0ef0917

    • SHA1

      1aae9c15fadcca7f1fca672a9155434a60bc3e7f

    • SHA256

      49bfc9569e26b29ef2c61ac6381f67bf51df40b24c89fdc98201205e0de06a01

    • SHA512

      bfa93a82b4127742d333c94d72899e5ba8f9feb46a6d3dc7534f754b9dfcb32244416cd5d0312af8924dd99b63c7b4e07943885c83a51fe610b5561e80b5cac8

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCvaC6D:RJWu0L8+mQbphVKeUuCMD

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks