General

  • Target

    444a49e7a815e2de768f2caedae9e5cfa3deaf759c9b903afbf55ea8baea08c8.bin

  • Size

    2.6MB

  • Sample

    250403-12xsrsxpv4

  • MD5

    0cdfa7325ef5c2958754719cd332d1e4

  • SHA1

    f8672afd0203b33a490aa72e05b2c5d9f95e8869

  • SHA256

    444a49e7a815e2de768f2caedae9e5cfa3deaf759c9b903afbf55ea8baea08c8

  • SHA512

    d085925fbf43c51b8d5c7c52b94ee17a9f7c6dfd68370fcc8196f369bce346940d9b3f2d9a11d2061f33200ebb729d98efdd2423aad574aa7cd1d4fec9921ac5

  • SSDEEP

    24576:E4m51+WtE0tCtoQgh+zRnadKTmguavUTZmImS+ci2w6p4Ctj3jb8mx:jJWu0tC1nyguaqFi2w6pRtY0

Malware Config

Targets

    • Target

      444a49e7a815e2de768f2caedae9e5cfa3deaf759c9b903afbf55ea8baea08c8.bin

    • Size

      2.6MB

    • MD5

      0cdfa7325ef5c2958754719cd332d1e4

    • SHA1

      f8672afd0203b33a490aa72e05b2c5d9f95e8869

    • SHA256

      444a49e7a815e2de768f2caedae9e5cfa3deaf759c9b903afbf55ea8baea08c8

    • SHA512

      d085925fbf43c51b8d5c7c52b94ee17a9f7c6dfd68370fcc8196f369bce346940d9b3f2d9a11d2061f33200ebb729d98efdd2423aad574aa7cd1d4fec9921ac5

    • SSDEEP

      24576:E4m51+WtE0tCtoQgh+zRnadKTmguavUTZmImS+ci2w6p4Ctj3jb8mx:jJWu0tC1nyguaqFi2w6pRtY0

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks