General

  • Target

    3a36f965bfdeddaadb460664e772a16d32f882662e7dc02444c1e1207ff2f304.bin

  • Size

    2.6MB

  • Sample

    250403-1223gsvwhz

  • MD5

    05346af8263c2235261a5650cde426ff

  • SHA1

    caa30bf468883af8c85cd4b774d408baa27be855

  • SHA256

    3a36f965bfdeddaadb460664e772a16d32f882662e7dc02444c1e1207ff2f304

  • SHA512

    a409d016323b19fc18dc2e65a45e60396ef2ae27267190511781990ab8bb2e736b6ce353a6662f7dcb57ee3a2c3648f1ba2e5297828a0d62995acf14a711f421

  • SSDEEP

    24576:Rh9N4m51+WtE0Jor5oHZFLHZ8jvTqDU8mWjmwCCUJMGCNvX:EJWu0JoqHZF2ThWiwCxCN/

Malware Config

Targets

    • Target

      3a36f965bfdeddaadb460664e772a16d32f882662e7dc02444c1e1207ff2f304.bin

    • Size

      2.6MB

    • MD5

      05346af8263c2235261a5650cde426ff

    • SHA1

      caa30bf468883af8c85cd4b774d408baa27be855

    • SHA256

      3a36f965bfdeddaadb460664e772a16d32f882662e7dc02444c1e1207ff2f304

    • SHA512

      a409d016323b19fc18dc2e65a45e60396ef2ae27267190511781990ab8bb2e736b6ce353a6662f7dcb57ee3a2c3648f1ba2e5297828a0d62995acf14a711f421

    • SSDEEP

      24576:Rh9N4m51+WtE0Jor5oHZFLHZ8jvTqDU8mWjmwCCUJMGCNvX:EJWu0JoqHZF2ThWiwCxCN/

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks