General

  • Target

    5d488d6f28751c51816f791fda20900274df2fbc327e0a225405fc7500f8003d.bin

  • Size

    4.6MB

  • Sample

    250403-19rlqavyh1

  • MD5

    6aea4d98efbd6006708cf8aeba3bc352

  • SHA1

    e50626273446cdf49b3ba642eec0320f04e6e49d

  • SHA256

    5d488d6f28751c51816f791fda20900274df2fbc327e0a225405fc7500f8003d

  • SHA512

    2da36ac2b09530dd66ff9d6ed2831a285909256293d7514e4b6f6b95099440f8f2ca1cfecb1174818aa88b1e94cc05ecc6656aad4ff281599a2eb003682da33b

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2CmELf+9rusvQW4zF2:JcJGS+XkLf+9pl

Malware Config

Targets

    • Target

      5d488d6f28751c51816f791fda20900274df2fbc327e0a225405fc7500f8003d.bin

    • Size

      4.6MB

    • MD5

      6aea4d98efbd6006708cf8aeba3bc352

    • SHA1

      e50626273446cdf49b3ba642eec0320f04e6e49d

    • SHA256

      5d488d6f28751c51816f791fda20900274df2fbc327e0a225405fc7500f8003d

    • SHA512

      2da36ac2b09530dd66ff9d6ed2831a285909256293d7514e4b6f6b95099440f8f2ca1cfecb1174818aa88b1e94cc05ecc6656aad4ff281599a2eb003682da33b

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2CmELf+9rusvQW4zF2:JcJGS+XkLf+9pl

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks