General

  • Target

    f1a6f7c65a91cc2e78c75e5eebd10b294ee132795d70e5d5104e5a8812f5acd4.bin

  • Size

    2.6MB

  • Sample

    250403-12z8wsvwhv

  • MD5

    0ae3f2ff02b4c7c43df449664b54c35a

  • SHA1

    a3b5aa9bd4cb6ee24e956d857807d1e41567791d

  • SHA256

    f1a6f7c65a91cc2e78c75e5eebd10b294ee132795d70e5d5104e5a8812f5acd4

  • SHA512

    6b0919ff838356028957b61dc76bd2cdab6fa688260416ba05ffdb786fc75c144e7590911f83e8e3fda731f29aba3b0156810c6e2d69e17eed206ead515b1eb0

  • SSDEEP

    24576:K2An4m51+WtE0x0J534E7fYOpPseljmkIrPN98m0eCffEDh3nMFl59zYXg7VHLz3:K74JWu0IJSeljo4R9jCIzp

Malware Config

Targets

    • Target

      f1a6f7c65a91cc2e78c75e5eebd10b294ee132795d70e5d5104e5a8812f5acd4.bin

    • Size

      2.6MB

    • MD5

      0ae3f2ff02b4c7c43df449664b54c35a

    • SHA1

      a3b5aa9bd4cb6ee24e956d857807d1e41567791d

    • SHA256

      f1a6f7c65a91cc2e78c75e5eebd10b294ee132795d70e5d5104e5a8812f5acd4

    • SHA512

      6b0919ff838356028957b61dc76bd2cdab6fa688260416ba05ffdb786fc75c144e7590911f83e8e3fda731f29aba3b0156810c6e2d69e17eed206ead515b1eb0

    • SSDEEP

      24576:K2An4m51+WtE0x0J534E7fYOpPseljmkIrPN98m0eCffEDh3nMFl59zYXg7VHLz3:K74JWu0IJSeljo4R9jCIzp

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks