General

  • Target

    5b73a893ec97507feb01cc98dfc0450e01a9fa92f0abadee8824053b418b6e59.bin

  • Size

    4.6MB

  • Sample

    250403-1y7tkaxnt4

  • MD5

    278582d09d7032821b3590181d37ce4f

  • SHA1

    01654d8960e264fe1e518e52c101f14dc28d8519

  • SHA256

    5b73a893ec97507feb01cc98dfc0450e01a9fa92f0abadee8824053b418b6e59

  • SHA512

    e8f8b51c174340137f921c33b93beefc0c7a0c6730db17cdd4aa9224c8cae4718c215c5d59726bc9240d006cd50e172c52160059c341bda08359389ba4d8dad8

  • SSDEEP

    49152:vAJWu04F3r8PtLxej5aCQiGuK9wZdR5KmUS12KtZ:YcHmgiVK9wZ/5KRYZ

Malware Config

Targets

    • Target

      5b73a893ec97507feb01cc98dfc0450e01a9fa92f0abadee8824053b418b6e59.bin

    • Size

      4.6MB

    • MD5

      278582d09d7032821b3590181d37ce4f

    • SHA1

      01654d8960e264fe1e518e52c101f14dc28d8519

    • SHA256

      5b73a893ec97507feb01cc98dfc0450e01a9fa92f0abadee8824053b418b6e59

    • SHA512

      e8f8b51c174340137f921c33b93beefc0c7a0c6730db17cdd4aa9224c8cae4718c215c5d59726bc9240d006cd50e172c52160059c341bda08359389ba4d8dad8

    • SSDEEP

      49152:vAJWu04F3r8PtLxej5aCQiGuK9wZdR5KmUS12KtZ:YcHmgiVK9wZ/5KRYZ

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks