General

  • Target

    0e4483786efa5b54e4351f2629e87a5a31a65ce345e8845cd45d7110907dd80f.bin

  • Size

    4.6MB

  • Sample

    250403-11hx8axny5

  • MD5

    327b655d0e9e2b53ea1bd6544a36bb86

  • SHA1

    62202020904310bd2d52ab2c5475d7a3134d04c1

  • SHA256

    0e4483786efa5b54e4351f2629e87a5a31a65ce345e8845cd45d7110907dd80f

  • SHA512

    a0bc4b03ea2e83bdb165b99ec0c8557050676e2f6ffaa116807f51120235625b86eeac98ef2f597ecc8662f36142003aaca2b7d7e620d35bdbd36510fb562994

  • SSDEEP

    49152:vAJWu04F3r8PtLxej5aCHkGuK9wZdR5KmUS1f5:YcHmXkVK9wZ/5Kg5

Malware Config

Targets

    • Target

      0e4483786efa5b54e4351f2629e87a5a31a65ce345e8845cd45d7110907dd80f.bin

    • Size

      4.6MB

    • MD5

      327b655d0e9e2b53ea1bd6544a36bb86

    • SHA1

      62202020904310bd2d52ab2c5475d7a3134d04c1

    • SHA256

      0e4483786efa5b54e4351f2629e87a5a31a65ce345e8845cd45d7110907dd80f

    • SHA512

      a0bc4b03ea2e83bdb165b99ec0c8557050676e2f6ffaa116807f51120235625b86eeac98ef2f597ecc8662f36142003aaca2b7d7e620d35bdbd36510fb562994

    • SSDEEP

      49152:vAJWu04F3r8PtLxej5aCHkGuK9wZdR5KmUS1f5:YcHmXkVK9wZ/5Kg5

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks