General

  • Target

    54bddf7775773a5c807e37b4039ba04afe82c19a3d14f013696f4fbfe5c3e2c8.bin

  • Size

    4.6MB

  • Sample

    250403-11fg4axny2

  • MD5

    b7f3680c7e57e9886d0000e8b0043cfd

  • SHA1

    bb9d396637f5e9d7eb246a220210956c23d79747

  • SHA256

    54bddf7775773a5c807e37b4039ba04afe82c19a3d14f013696f4fbfe5c3e2c8

  • SHA512

    5f79a484a2162e122b8bcac9af2418dd8ef7d886f0d4952560ddd656c4fbaa9eee815b449978f273d25a2c55f29bcb89f283eec706727bfd751417add11ede93

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2C+ZWf+9rusvQW4zFW:JcJGS+XdWf+9pD

Malware Config

Targets

    • Target

      54bddf7775773a5c807e37b4039ba04afe82c19a3d14f013696f4fbfe5c3e2c8.bin

    • Size

      4.6MB

    • MD5

      b7f3680c7e57e9886d0000e8b0043cfd

    • SHA1

      bb9d396637f5e9d7eb246a220210956c23d79747

    • SHA256

      54bddf7775773a5c807e37b4039ba04afe82c19a3d14f013696f4fbfe5c3e2c8

    • SHA512

      5f79a484a2162e122b8bcac9af2418dd8ef7d886f0d4952560ddd656c4fbaa9eee815b449978f273d25a2c55f29bcb89f283eec706727bfd751417add11ede93

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2C+ZWf+9rusvQW4zFW:JcJGS+XdWf+9pD

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks