General

  • Target

    b36a9e05332bdc76692c585d0349f905dc684f6515b55d3e59c397d70f6ef7e2.bin

  • Size

    2.6MB

  • Sample

    250403-1y672avvgs

  • MD5

    36850c62ab613134ee010798f2dabc3d

  • SHA1

    65e8707d73f172044e7e2d0524cb461ed8c97aac

  • SHA256

    b36a9e05332bdc76692c585d0349f905dc684f6515b55d3e59c397d70f6ef7e2

  • SHA512

    5109bfc7d4e96cfb6128605296c86d99a50b103636e2b40779641b70c18a002c2ac7ba5311d4ff47e8c8b8b58d50296349ad8a640f792149938fdbed402d9510

  • SSDEEP

    24576:PN4m51+WtE0FmHvFqfE6T73A69zpzmu5njRhVMZleC1qy:PuJWu0FUi73AUCu5nRjC1z

Malware Config

Targets

    • Target

      b36a9e05332bdc76692c585d0349f905dc684f6515b55d3e59c397d70f6ef7e2.bin

    • Size

      2.6MB

    • MD5

      36850c62ab613134ee010798f2dabc3d

    • SHA1

      65e8707d73f172044e7e2d0524cb461ed8c97aac

    • SHA256

      b36a9e05332bdc76692c585d0349f905dc684f6515b55d3e59c397d70f6ef7e2

    • SHA512

      5109bfc7d4e96cfb6128605296c86d99a50b103636e2b40779641b70c18a002c2ac7ba5311d4ff47e8c8b8b58d50296349ad8a640f792149938fdbed402d9510

    • SSDEEP

      24576:PN4m51+WtE0FmHvFqfE6T73A69zpzmu5njRhVMZleC1qy:PuJWu0FUi73AUCu5nRjC1z

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks