General

  • Target

    e7e3f421e97b0d2495e6c8cd0f976ebe98f59bbc5a95252356308317c14591f3.bin

  • Size

    2.6MB

  • Sample

    250403-11v8jsvwez

  • MD5

    1a7565deef17e40399b7139f1d78056b

  • SHA1

    2538c6bf476201a7232d399772edddcd229043fa

  • SHA256

    e7e3f421e97b0d2495e6c8cd0f976ebe98f59bbc5a95252356308317c14591f3

  • SHA512

    15d292993827822903f67acf3b0a281163b6c3268813f9e13bd2c3b976ea00e1323151b736a3ef4703f61b3bacb5bddc775c0d6d073cafab32243e5f9bc5c4f7

  • SSDEEP

    24576:Fe4m51+WtE0x/ZJmUxZiZ1ffWlJBb8TRAqniPKi/rDgCj5Ep9N2nDl5vzOymBVRJ:fJWu0fZpT9mTkebCvU

Malware Config

Targets

    • Target

      e7e3f421e97b0d2495e6c8cd0f976ebe98f59bbc5a95252356308317c14591f3.bin

    • Size

      2.6MB

    • MD5

      1a7565deef17e40399b7139f1d78056b

    • SHA1

      2538c6bf476201a7232d399772edddcd229043fa

    • SHA256

      e7e3f421e97b0d2495e6c8cd0f976ebe98f59bbc5a95252356308317c14591f3

    • SHA512

      15d292993827822903f67acf3b0a281163b6c3268813f9e13bd2c3b976ea00e1323151b736a3ef4703f61b3bacb5bddc775c0d6d073cafab32243e5f9bc5c4f7

    • SSDEEP

      24576:Fe4m51+WtE0x/ZJmUxZiZ1ffWlJBb8TRAqniPKi/rDgCj5Ep9N2nDl5vzOymBVRJ:fJWu0fZpT9mTkebCvU

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks