General

  • Target

    ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385.bin

  • Size

    2.6MB

  • Sample

    250403-1y9yxsvvgw

  • MD5

    740ddb167cfe8f9cb80d01143bf344c3

  • SHA1

    b5a6ce5f7335d8e05c872e3fb028d7ac047730c8

  • SHA256

    ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385

  • SHA512

    0d7a76b7a7b86d893f152f3d87c5fd903e8e112b99afcb5b43cd51d5383da748327c881c04efd487b4227cc4819c9b80486d80010defa1966e5ba13a0cd7894e

  • SSDEEP

    24576:v18V4m51+WtE0fC+ynIQ0bA9PLo65gOeJyhCt7HPgcBd8SmLK4+TtWx:v18mJWu0fC3a0KQM/Bd8SJc

Malware Config

Targets

    • Target

      ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385.bin

    • Size

      2.6MB

    • MD5

      740ddb167cfe8f9cb80d01143bf344c3

    • SHA1

      b5a6ce5f7335d8e05c872e3fb028d7ac047730c8

    • SHA256

      ba5bd719b357b9e6143b1b356a3e59bf12601e096ebe911b06db5acbbf793385

    • SHA512

      0d7a76b7a7b86d893f152f3d87c5fd903e8e112b99afcb5b43cd51d5383da748327c881c04efd487b4227cc4819c9b80486d80010defa1966e5ba13a0cd7894e

    • SSDEEP

      24576:v18V4m51+WtE0fC+ynIQ0bA9PLo65gOeJyhCt7HPgcBd8SmLK4+TtWx:v18mJWu0fC3a0KQM/Bd8SJc

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks