General

  • Target

    815744d6db373c14db8830b433ea56d32057dc9bc7bce93a01cccf6c66d5ead5.bin

  • Size

    4.5MB

  • Sample

    250403-12w68svwhs

  • MD5

    0d926e9ff9e7da39dbbc228540ffb558

  • SHA1

    0b1f66bb4ba1a9c150beb761922acb9dd8d94d79

  • SHA256

    815744d6db373c14db8830b433ea56d32057dc9bc7bce93a01cccf6c66d5ead5

  • SHA512

    94e81cbcee4620f95a333153126df9432a399a718dd122d8784936ab658478b4ba3d05ceef62b9b4dd8d15550af16602c92dcaf70b77083bd8e621f14355c6e8

  • SSDEEP

    49152:LJWu0/9Sn0DhYXU+OI2dbHBighsD98OVBZepkPh8CrzcbPk73o7:LcIn091+OI2dbHBighsBFVBZ5E7

Malware Config

Targets

    • Target

      815744d6db373c14db8830b433ea56d32057dc9bc7bce93a01cccf6c66d5ead5.bin

    • Size

      4.5MB

    • MD5

      0d926e9ff9e7da39dbbc228540ffb558

    • SHA1

      0b1f66bb4ba1a9c150beb761922acb9dd8d94d79

    • SHA256

      815744d6db373c14db8830b433ea56d32057dc9bc7bce93a01cccf6c66d5ead5

    • SHA512

      94e81cbcee4620f95a333153126df9432a399a718dd122d8784936ab658478b4ba3d05ceef62b9b4dd8d15550af16602c92dcaf70b77083bd8e621f14355c6e8

    • SSDEEP

      49152:LJWu0/9Sn0DhYXU+OI2dbHBighsD98OVBZepkPh8CrzcbPk73o7:LcIn091+OI2dbHBighsBFVBZ5E7

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks