General

  • Target

    6b16fafa8b2cc7ce01c63ea258f54913fb13cd066e3d5269621b7c1792c53b6d.bin

  • Size

    2.6MB

  • Sample

    250403-11jvhsxny7

  • MD5

    aaaaef6f82914104381a25997c8b3aa3

  • SHA1

    2deb806008e8fe728b78e7fc6eebba6793f1a09d

  • SHA256

    6b16fafa8b2cc7ce01c63ea258f54913fb13cd066e3d5269621b7c1792c53b6d

  • SHA512

    4d3be5445c8420abe583a1360ae3192b3eb745815bf49f8fb1c2dd557c81e95639e8d66ebf6e1f0400706f1d5b02d686b3cc7cb427b76e46be179a17547ab35f

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCCaWQ:RJWu0L8+mQbphVKeUuCr

Malware Config

Targets

    • Target

      6b16fafa8b2cc7ce01c63ea258f54913fb13cd066e3d5269621b7c1792c53b6d.bin

    • Size

      2.6MB

    • MD5

      aaaaef6f82914104381a25997c8b3aa3

    • SHA1

      2deb806008e8fe728b78e7fc6eebba6793f1a09d

    • SHA256

      6b16fafa8b2cc7ce01c63ea258f54913fb13cd066e3d5269621b7c1792c53b6d

    • SHA512

      4d3be5445c8420abe583a1360ae3192b3eb745815bf49f8fb1c2dd557c81e95639e8d66ebf6e1f0400706f1d5b02d686b3cc7cb427b76e46be179a17547ab35f

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCCaWQ:RJWu0L8+mQbphVKeUuCr

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks