General

  • Target

    bd1890adf40b4f70412647a1161a3205e7dba9a97ee044e50954a57c516b5b9a.bin

  • Size

    2.6MB

  • Sample

    250403-12b63avwf1

  • MD5

    1c07209715317bd5443c745abf97b352

  • SHA1

    e6c1beb5efc199fe6c1393c9b3a040d97be510de

  • SHA256

    bd1890adf40b4f70412647a1161a3205e7dba9a97ee044e50954a57c516b5b9a

  • SHA512

    161509ce403d90f1e31ca08755d142ed2aa1e6d66ff3a7e6125d371d3e6b0745e534b539209e3939b1a339d99dfbf4dcb39056223ed9c1dc4dd934bf8a2f47e7

  • SSDEEP

    24576:sr4m51+WtE0+gDdgm8xrroKlyAkbrIGhWUlEcsQVfCFRa:9JWu0ddgm8xx2dWcEcJCFY

Malware Config

Targets

    • Target

      bd1890adf40b4f70412647a1161a3205e7dba9a97ee044e50954a57c516b5b9a.bin

    • Size

      2.6MB

    • MD5

      1c07209715317bd5443c745abf97b352

    • SHA1

      e6c1beb5efc199fe6c1393c9b3a040d97be510de

    • SHA256

      bd1890adf40b4f70412647a1161a3205e7dba9a97ee044e50954a57c516b5b9a

    • SHA512

      161509ce403d90f1e31ca08755d142ed2aa1e6d66ff3a7e6125d371d3e6b0745e534b539209e3939b1a339d99dfbf4dcb39056223ed9c1dc4dd934bf8a2f47e7

    • SSDEEP

      24576:sr4m51+WtE0+gDdgm8xrroKlyAkbrIGhWUlEcsQVfCFRa:9JWu0ddgm8xx2dWcEcJCFY

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks