General

  • Target

    be53fe9013de3d564ff883f7b68121388a1242494f2539f9ebb96424b45c3817.bin

  • Size

    4.6MB

  • Sample

    250403-1y6aqsvvfz

  • MD5

    37e723ec30d4850e7c05f1d02110215a

  • SHA1

    c5bf6a80c30f427164bac6779628605319354156

  • SHA256

    be53fe9013de3d564ff883f7b68121388a1242494f2539f9ebb96424b45c3817

  • SHA512

    9d15b182720665f08a337c21704a23ed27e1231da79bb32dacae6688ac3af0deda9c1934feea5da22275e2383c561542b67d9dde685df2c66a5bb40d9398aad9

  • SSDEEP

    49152:JJWu0JGQRxTV3AnRpJM34m2COPAf+9rusvQW4zFd:JcJGS+XPAf+9p2

Malware Config

Targets

    • Target

      be53fe9013de3d564ff883f7b68121388a1242494f2539f9ebb96424b45c3817.bin

    • Size

      4.6MB

    • MD5

      37e723ec30d4850e7c05f1d02110215a

    • SHA1

      c5bf6a80c30f427164bac6779628605319354156

    • SHA256

      be53fe9013de3d564ff883f7b68121388a1242494f2539f9ebb96424b45c3817

    • SHA512

      9d15b182720665f08a337c21704a23ed27e1231da79bb32dacae6688ac3af0deda9c1934feea5da22275e2383c561542b67d9dde685df2c66a5bb40d9398aad9

    • SSDEEP

      49152:JJWu0JGQRxTV3AnRpJM34m2COPAf+9rusvQW4zFd:JcJGS+XPAf+9p2

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks