General

  • Target

    583c99ffd90b78e2109dfd701ec3bf895fa41c5194d62ec8472c128e163b7a7b.bin

  • Size

    2.6MB

  • Sample

    250403-11ntgaxnz4

  • MD5

    2c818a320108e8dec687b75f8355097a

  • SHA1

    a8244bf031c2e9c8625d78ba1bca31f96e852f81

  • SHA256

    583c99ffd90b78e2109dfd701ec3bf895fa41c5194d62ec8472c128e163b7a7b

  • SHA512

    417f1efbeae33e6c966294b38c57972849869258a2f1916b55dd1de3d78ac3eba27ade8ec2e82d9936252f07ab071e6269afd93fa8314641db4732e81806744c

  • SSDEEP

    24576:IF54m51+WtE0ANhf6DJfdD5nIRkE6r0lgCNcsij34w4k/CQPg:PJWu0uysij3zCQI

Malware Config

Targets

    • Target

      583c99ffd90b78e2109dfd701ec3bf895fa41c5194d62ec8472c128e163b7a7b.bin

    • Size

      2.6MB

    • MD5

      2c818a320108e8dec687b75f8355097a

    • SHA1

      a8244bf031c2e9c8625d78ba1bca31f96e852f81

    • SHA256

      583c99ffd90b78e2109dfd701ec3bf895fa41c5194d62ec8472c128e163b7a7b

    • SHA512

      417f1efbeae33e6c966294b38c57972849869258a2f1916b55dd1de3d78ac3eba27ade8ec2e82d9936252f07ab071e6269afd93fa8314641db4732e81806744c

    • SSDEEP

      24576:IF54m51+WtE0ANhf6DJfdD5nIRkE6r0lgCNcsij34w4k/CQPg:PJWu0uysij3zCQI

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks