General

  • Target

    18da57a33d77b2c2f48563fdd3cb9395cf697489a5d59c58106625237642b6f7.bin

  • Size

    2.6MB

  • Sample

    250403-1z37rsxnx2

  • MD5

    136db3170521d0ace9e88a1ac03d662d

  • SHA1

    995170d58bce51fadb5277ae9f6db803123bfea1

  • SHA256

    18da57a33d77b2c2f48563fdd3cb9395cf697489a5d59c58106625237642b6f7

  • SHA512

    4e3bd05da73ee3062ade2e174c1324adb5ef227ddd17ffbbf22b789b13c3e9cfe2a7fff441df4a3bed95ed5d363e9bb17ebb08c173f894b28271d1144909d6dd

  • SSDEEP

    24576:lztsuy4m51+WtE0VCjP+GdPlKopoK7dduEjArPu9feO2P9PERIQrkEl5zz5HGHVb:pJWu0VCj+ksgrdduEkG3N9cK43

Malware Config

Targets

    • Target

      18da57a33d77b2c2f48563fdd3cb9395cf697489a5d59c58106625237642b6f7.bin

    • Size

      2.6MB

    • MD5

      136db3170521d0ace9e88a1ac03d662d

    • SHA1

      995170d58bce51fadb5277ae9f6db803123bfea1

    • SHA256

      18da57a33d77b2c2f48563fdd3cb9395cf697489a5d59c58106625237642b6f7

    • SHA512

      4e3bd05da73ee3062ade2e174c1324adb5ef227ddd17ffbbf22b789b13c3e9cfe2a7fff441df4a3bed95ed5d363e9bb17ebb08c173f894b28271d1144909d6dd

    • SSDEEP

      24576:lztsuy4m51+WtE0VCjP+GdPlKopoK7dduEjArPu9feO2P9PERIQrkEl5zz5HGHVb:pJWu0VCj+ksgrdduEkG3N9cK43

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks