General

  • Target

    412e23459f733b4bb0e5a173624457c632e04397e364ea5a503e71e93526efe7.bin

  • Size

    2.6MB

  • Sample

    250403-12sh2sxpt7

  • MD5

    11a00096901c5ed14f17a7fe9ba557ec

  • SHA1

    69e2536f36d1a93ee60d2abec3302c27a07f9d9d

  • SHA256

    412e23459f733b4bb0e5a173624457c632e04397e364ea5a503e71e93526efe7

  • SHA512

    15c93c2aab90fed667140e346a1d6fc701ea4b44c1f32297d9af02786d927c6845058c283d412bc065ce830b635f1b3ce7769f3c861411afba9f2de89d705a07

  • SSDEEP

    24576:sr4m51+WtE0+gDdgm8xrroKlyAkbrIGhWUlEcsQVfCdLZ:9JWu0ddgm8xx2dWcEcJCdt

Malware Config

Targets

    • Target

      412e23459f733b4bb0e5a173624457c632e04397e364ea5a503e71e93526efe7.bin

    • Size

      2.6MB

    • MD5

      11a00096901c5ed14f17a7fe9ba557ec

    • SHA1

      69e2536f36d1a93ee60d2abec3302c27a07f9d9d

    • SHA256

      412e23459f733b4bb0e5a173624457c632e04397e364ea5a503e71e93526efe7

    • SHA512

      15c93c2aab90fed667140e346a1d6fc701ea4b44c1f32297d9af02786d927c6845058c283d412bc065ce830b635f1b3ce7769f3c861411afba9f2de89d705a07

    • SSDEEP

      24576:sr4m51+WtE0+gDdgm8xrroKlyAkbrIGhWUlEcsQVfCdLZ:9JWu0ddgm8xx2dWcEcJCdt

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks