General

  • Target

    2d45a49fc086d737d8591e38b924aee407c3a355a5c774a07e3d38fda98ec206.bin

  • Size

    4.6MB

  • Sample

    250403-1zs2ssvwax

  • MD5

    b251e3393019c792bab8887753eaeee5

  • SHA1

    e3aea509212a774c0d7b67226af5af7e8a9a912c

  • SHA256

    2d45a49fc086d737d8591e38b924aee407c3a355a5c774a07e3d38fda98ec206

  • SHA512

    491b9a34dada54eae2fe8b60fc2963e96d1c6f8a809f6cde7f35fb65525c8def679a922f75fe5801dbeb6925d170ff3edcce766901d5dfcaa328adbe8c6dbfa6

  • SSDEEP

    49152:vAJWu04F3r8PtLxej5aCQ1GuK9wZdR5KmUS1M/:YcHmg1VK9wZ/5KL/

Malware Config

Targets

    • Target

      2d45a49fc086d737d8591e38b924aee407c3a355a5c774a07e3d38fda98ec206.bin

    • Size

      4.6MB

    • MD5

      b251e3393019c792bab8887753eaeee5

    • SHA1

      e3aea509212a774c0d7b67226af5af7e8a9a912c

    • SHA256

      2d45a49fc086d737d8591e38b924aee407c3a355a5c774a07e3d38fda98ec206

    • SHA512

      491b9a34dada54eae2fe8b60fc2963e96d1c6f8a809f6cde7f35fb65525c8def679a922f75fe5801dbeb6925d170ff3edcce766901d5dfcaa328adbe8c6dbfa6

    • SSDEEP

      49152:vAJWu04F3r8PtLxej5aCQ1GuK9wZdR5KmUS1M/:YcHmg1VK9wZ/5KL/

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks