General

  • Target

    10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509.bin

  • Size

    2.6MB

  • Sample

    250403-11mleavwdx

  • MD5

    3ea8bc01f668299b4ebeda4c8242e3e2

  • SHA1

    b836281c48b75d6675c2caa2660baa5fa420efba

  • SHA256

    10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509

  • SHA512

    bc380cef800b780bd671b46ab798171154028701e8a4e3bd01ee9cc6c4c18836f8e341e0d709e2c8663f8dc89a4fcf1a29a6a88a4ab365dbec6d9765fd40314c

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuC8aUZ:RJWu0L8+mQbphVKeUuCK

Malware Config

Targets

    • Target

      10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509.bin

    • Size

      2.6MB

    • MD5

      3ea8bc01f668299b4ebeda4c8242e3e2

    • SHA1

      b836281c48b75d6675c2caa2660baa5fa420efba

    • SHA256

      10d6eb4c1411955d521640d4c70b544fe9fe4b09433f132bc2f4abbc6e098509

    • SHA512

      bc380cef800b780bd671b46ab798171154028701e8a4e3bd01ee9cc6c4c18836f8e341e0d709e2c8663f8dc89a4fcf1a29a6a88a4ab365dbec6d9765fd40314c

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuC8aUZ:RJWu0L8+mQbphVKeUuCK

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks