General

  • Target

    67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f.bin

  • Size

    2.6MB

  • Sample

    250403-11zwqsvwft

  • MD5

    2cf5d0e30ada7faf1e6d850ece62e44c

  • SHA1

    20e547eadc7e8a6fe11b109a8da39bdc2d4f35c8

  • SHA256

    67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f

  • SHA512

    9c729fd987a39d42962d93b391bb77962639eb8b1acb3c7dd988ea0811cd69b86651c9e71e682843cd4aed9bfec909bf38680cda5aa3706284f51309b653c103

  • SSDEEP

    24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCjaUx9:RJWu0L8+mQbphVKeUuCl9

Malware Config

Targets

    • Target

      67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f.bin

    • Size

      2.6MB

    • MD5

      2cf5d0e30ada7faf1e6d850ece62e44c

    • SHA1

      20e547eadc7e8a6fe11b109a8da39bdc2d4f35c8

    • SHA256

      67cc301643507639f40d7b827e615ce181b58b706e40f3fa32363a3ea73f924f

    • SHA512

      9c729fd987a39d42962d93b391bb77962639eb8b1acb3c7dd988ea0811cd69b86651c9e71e682843cd4aed9bfec909bf38680cda5aa3706284f51309b653c103

    • SSDEEP

      24576:kqwT4m51+WtE0LGbVU0/rCqt+h4QEophH1TpJmFHE0xMUuCjaUx9:RJWu0L8+mQbphVKeUuCl9

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks