General

  • Target

    0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db.bin

  • Size

    2.6MB

  • Sample

    250403-12wkpsvwg1

  • MD5

    0de94f62bd76b3abc135eca2edc452b2

  • SHA1

    b308a5a45ae3a3882bd494edc0e925e7d2a3681a

  • SHA256

    0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db

  • SHA512

    44d2d95e26d7563f4c8ea907159f6b232708c2e09229b77236e2a8ad13413bfe6044caabddfbe73dda779618cd8d7d8b02e0fadfef4c61bf3be1d1fe3b0bf299

  • SSDEEP

    24576:G4m51+WtE0Ee93y/29339YPa8UGYqRpv+crRy5vstKctS3WCHUCxa42r:9JWu0n9l9X8UGL5r/RtS3WVCAr

Malware Config

Targets

    • Target

      0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db.bin

    • Size

      2.6MB

    • MD5

      0de94f62bd76b3abc135eca2edc452b2

    • SHA1

      b308a5a45ae3a3882bd494edc0e925e7d2a3681a

    • SHA256

      0a8d168419786ae9a2ab7cbd956cb9ea10df12f77bfe5af9f2c0a2acae0646db

    • SHA512

      44d2d95e26d7563f4c8ea907159f6b232708c2e09229b77236e2a8ad13413bfe6044caabddfbe73dda779618cd8d7d8b02e0fadfef4c61bf3be1d1fe3b0bf299

    • SSDEEP

      24576:G4m51+WtE0Ee93y/29339YPa8UGYqRpv+crRy5vstKctS3WCHUCxa42r:9JWu0n9l9X8UGL5r/RtS3WVCAr

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks