General

  • Target

    72281a505e398d2e667bbfbcded9de2fd9c456c082c33b2ae2c0711161d0d9b3.bin

  • Size

    2.6MB

  • Sample

    250403-11kf2svwdw

  • MD5

    da860b788133f16ad5c46015b443b7e5

  • SHA1

    aaabd414d62492a279dad6a80ea7ef224d2b575b

  • SHA256

    72281a505e398d2e667bbfbcded9de2fd9c456c082c33b2ae2c0711161d0d9b3

  • SHA512

    ef3f90d20f5e3de816e80c01a92af4a64a226a4f3c66b5a9dd01801f797c61f301e4908c667eb3e64e1218c4b337255825f01230cd0c1f28ea7916577a407171

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCFazmv:RJWu0L8+mQbphVKeUuC7v

Malware Config

Targets

    • Target

      72281a505e398d2e667bbfbcded9de2fd9c456c082c33b2ae2c0711161d0d9b3.bin

    • Size

      2.6MB

    • MD5

      da860b788133f16ad5c46015b443b7e5

    • SHA1

      aaabd414d62492a279dad6a80ea7ef224d2b575b

    • SHA256

      72281a505e398d2e667bbfbcded9de2fd9c456c082c33b2ae2c0711161d0d9b3

    • SHA512

      ef3f90d20f5e3de816e80c01a92af4a64a226a4f3c66b5a9dd01801f797c61f301e4908c667eb3e64e1218c4b337255825f01230cd0c1f28ea7916577a407171

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCFazmv:RJWu0L8+mQbphVKeUuC7v

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks