General

  • Target

    45d0f77c6cb3c87f6e129bdc379dcb21cb17e101fdfc7011c097de3254b4e059.bin

  • Size

    2.6MB

  • Sample

    250403-12yp3avwht

  • MD5

    0bea2514590cca62d1741c1ac008dfde

  • SHA1

    cffda5edee614ff84ff6d96ed023a8cd20fc79c0

  • SHA256

    45d0f77c6cb3c87f6e129bdc379dcb21cb17e101fdfc7011c097de3254b4e059

  • SHA512

    00dadb34c021cbc3fb3d1ad0419e12fb49934aa3fa439889922d71d2deb57e544d9069f90be8fa0ab371d9522d2178b77403ad85e7f6c355ad461cc77ac9200a

  • SSDEEP

    24576:fe4m51+WtE0p/eQN9Crnhkmh9yWNyEu20WK0bZptOilurC/th:dJWu0bWlHNmWfbZT7IC/3

Malware Config

Targets

    • Target

      45d0f77c6cb3c87f6e129bdc379dcb21cb17e101fdfc7011c097de3254b4e059.bin

    • Size

      2.6MB

    • MD5

      0bea2514590cca62d1741c1ac008dfde

    • SHA1

      cffda5edee614ff84ff6d96ed023a8cd20fc79c0

    • SHA256

      45d0f77c6cb3c87f6e129bdc379dcb21cb17e101fdfc7011c097de3254b4e059

    • SHA512

      00dadb34c021cbc3fb3d1ad0419e12fb49934aa3fa439889922d71d2deb57e544d9069f90be8fa0ab371d9522d2178b77403ad85e7f6c355ad461cc77ac9200a

    • SSDEEP

      24576:fe4m51+WtE0p/eQN9Crnhkmh9yWNyEu20WK0bZptOilurC/th:dJWu0bWlHNmWfbZT7IC/3

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks