General

  • Target

    3c43d35923708a89a59dfb1036b1043cd1c35769cf1a82cfe1caaccca3167683.bin

  • Size

    2.6MB

  • Sample

    250403-11z7haxnz9

  • MD5

    2b0231cad842d6fbc4a84f8488c2da27

  • SHA1

    a1e6b4c99c154dff651dce9de271afd02126ec03

  • SHA256

    3c43d35923708a89a59dfb1036b1043cd1c35769cf1a82cfe1caaccca3167683

  • SHA512

    69c7ccd4acd67e5946401b31c9b349c27bda18977731402a1b13ab66cf1167d0708e776e76d48d38e48b21ca9739a3350df8c029694eca51ac77a07b9464d826

  • SSDEEP

    24576:Lf4m51+WtE0K24sCMi+mouORWSzrOh984wOn++HoW1xjV0KifXLCMKq:LAJWu08sChLwO+WDjV0KobCM5

Malware Config

Targets

    • Target

      3c43d35923708a89a59dfb1036b1043cd1c35769cf1a82cfe1caaccca3167683.bin

    • Size

      2.6MB

    • MD5

      2b0231cad842d6fbc4a84f8488c2da27

    • SHA1

      a1e6b4c99c154dff651dce9de271afd02126ec03

    • SHA256

      3c43d35923708a89a59dfb1036b1043cd1c35769cf1a82cfe1caaccca3167683

    • SHA512

      69c7ccd4acd67e5946401b31c9b349c27bda18977731402a1b13ab66cf1167d0708e776e76d48d38e48b21ca9739a3350df8c029694eca51ac77a07b9464d826

    • SSDEEP

      24576:Lf4m51+WtE0K24sCMi+mouORWSzrOh984wOn++HoW1xjV0KifXLCMKq:LAJWu08sChLwO+WDjV0KobCM5

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks