General

  • Target

    6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0.bin

  • Size

    2.6MB

  • Sample

    250403-1zlygsvvhy

  • MD5

    c8322806aa34ea8c172a9cdeb7329894

  • SHA1

    8f5286e25c001181ad69813f936fb42d739f7729

  • SHA256

    6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0

  • SHA512

    b063839278cc497039c62d654f274e1d673a2ae8d309731e84bef467be42263bf327c5be9abeba07df924c57ff7dd6e64f535a4ee29f97541e382f882174cbd6

  • SSDEEP

    24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CHLU:4JWu0Oe9YYcgNNddSvCH4

Malware Config

Targets

    • Target

      6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0.bin

    • Size

      2.6MB

    • MD5

      c8322806aa34ea8c172a9cdeb7329894

    • SHA1

      8f5286e25c001181ad69813f936fb42d739f7729

    • SHA256

      6ebce923b99eda2abd5fc27551cea7fd5dc34028144783475754084d080b6cb0

    • SHA512

      b063839278cc497039c62d654f274e1d673a2ae8d309731e84bef467be42263bf327c5be9abeba07df924c57ff7dd6e64f535a4ee29f97541e382f882174cbd6

    • SSDEEP

      24576:aLB24m51+WtE05casQ8S+B2Wb2rv944tek8G2smMmiqNzOz2rcNNddSWRa1CHLU:4JWu0Oe9YYcgNNddSvCH4

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks