General

  • Target

    5918e2b6e0c7ac00b366247a34f3e5f5a6fb8ceb97b16e468014fbb720155a31.bin

  • Size

    2.6MB

  • Sample

    250403-11pe1avwdz

  • MD5

    39f17a1970ac8605277902cbc62456d5

  • SHA1

    c1c7708cf92bc992f374082fb81337ee8edf11e1

  • SHA256

    5918e2b6e0c7ac00b366247a34f3e5f5a6fb8ceb97b16e468014fbb720155a31

  • SHA512

    232f99f6674fd9a7073a19a3e89ab10361c0c7e1e527937259f5fecb5f49b49afd76c44ed10ca5dc9d7877638d09e1643b8bf39a26562a3f97eac0a4a7ef9405

  • SSDEEP

    24576:3HzhW/4m51+WtE09B1FiQHJ/zdsFdoztuM/Pc//Zmmc8I/qfC5W1:XfJWu09VJ/TE//ZmebC5u

Malware Config

Targets

    • Target

      5918e2b6e0c7ac00b366247a34f3e5f5a6fb8ceb97b16e468014fbb720155a31.bin

    • Size

      2.6MB

    • MD5

      39f17a1970ac8605277902cbc62456d5

    • SHA1

      c1c7708cf92bc992f374082fb81337ee8edf11e1

    • SHA256

      5918e2b6e0c7ac00b366247a34f3e5f5a6fb8ceb97b16e468014fbb720155a31

    • SHA512

      232f99f6674fd9a7073a19a3e89ab10361c0c7e1e527937259f5fecb5f49b49afd76c44ed10ca5dc9d7877638d09e1643b8bf39a26562a3f97eac0a4a7ef9405

    • SSDEEP

      24576:3HzhW/4m51+WtE09B1FiQHJ/zdsFdoztuM/Pc//Zmmc8I/qfC5W1:XfJWu09VJ/TE//ZmebC5u

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks