General

  • Target

    c95bfdf32b2232f236c246212f1588bbfa98cc3da4f1764586b7593ac7b98b4d.bin

  • Size

    2.6MB

  • Sample

    250403-12s5ksxpt8

  • MD5

    108e51664fae751b4b545dc08bf3d03f

  • SHA1

    e6c16f71832878d01c5235ff72b92d48dd514208

  • SHA256

    c95bfdf32b2232f236c246212f1588bbfa98cc3da4f1764586b7593ac7b98b4d

  • SHA512

    e0d4cac1d15cad2f5d2ded6768a681491fbcaad5a513622425a053ac050db3c148a0464f7a61656f580be86a8483fa293fd275dc80a6d4421a0566b835fe2962

  • SSDEEP

    24576:Qi4m51+WtE0POFeyWZDI6lQpwl799wOtrBHxuce41MiJjV9CWOFO:QhJWu0WIlVe41MmrCW+O

Malware Config

Targets

    • Target

      c95bfdf32b2232f236c246212f1588bbfa98cc3da4f1764586b7593ac7b98b4d.bin

    • Size

      2.6MB

    • MD5

      108e51664fae751b4b545dc08bf3d03f

    • SHA1

      e6c16f71832878d01c5235ff72b92d48dd514208

    • SHA256

      c95bfdf32b2232f236c246212f1588bbfa98cc3da4f1764586b7593ac7b98b4d

    • SHA512

      e0d4cac1d15cad2f5d2ded6768a681491fbcaad5a513622425a053ac050db3c148a0464f7a61656f580be86a8483fa293fd275dc80a6d4421a0566b835fe2962

    • SSDEEP

      24576:Qi4m51+WtE0POFeyWZDI6lQpwl799wOtrBHxuce41MiJjV9CWOFO:QhJWu0WIlVe41MmrCW+O

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks