General

  • Target

    0eb0c0cbfcc0bb9fd4c6d5a575fc42d0b4c48e7ac17a4309e91a098314256657.bin

  • Size

    2.6MB

  • Sample

    250403-1zbshsvvgz

  • MD5

    e1f5282bf26ecab488fa179ac7db1a01

  • SHA1

    964252eaec0ca316a09ca899bb05a81131c3c691

  • SHA256

    0eb0c0cbfcc0bb9fd4c6d5a575fc42d0b4c48e7ac17a4309e91a098314256657

  • SHA512

    c7143e933a57fe7415d3a6f57ee2dada85e81d63cf2d5eca148f70523e65995ee898a6384925ef478ade0a380946ac11ac6879e99eb67e31b167dc991680dfe0

  • SSDEEP

    24576:NoAB4m51+WtE0vc2tAsuVwnwANMOl21G8yxmGnPATCm3CM:yAaJWu0YVaadyaCmyM

Malware Config

Targets

    • Target

      0eb0c0cbfcc0bb9fd4c6d5a575fc42d0b4c48e7ac17a4309e91a098314256657.bin

    • Size

      2.6MB

    • MD5

      e1f5282bf26ecab488fa179ac7db1a01

    • SHA1

      964252eaec0ca316a09ca899bb05a81131c3c691

    • SHA256

      0eb0c0cbfcc0bb9fd4c6d5a575fc42d0b4c48e7ac17a4309e91a098314256657

    • SHA512

      c7143e933a57fe7415d3a6f57ee2dada85e81d63cf2d5eca148f70523e65995ee898a6384925ef478ade0a380946ac11ac6879e99eb67e31b167dc991680dfe0

    • SSDEEP

      24576:NoAB4m51+WtE0vc2tAsuVwnwANMOl21G8yxmGnPATCm3CM:yAaJWu0YVaadyaCmyM

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks