General

  • Target

    e3550ca2582b25b317c0986a52fcc62aaa5d9276de29f2fd3ffc4271f574fe36.bin

  • Size

    2.6MB

  • Sample

    250403-1zt9vsxnv7

  • MD5

    58f6382594c17138dfce9dfc4d0f0bea

  • SHA1

    9cfe23681990c1946bfaae57cc5114c32b33c766

  • SHA256

    e3550ca2582b25b317c0986a52fcc62aaa5d9276de29f2fd3ffc4271f574fe36

  • SHA512

    fec75f9571a90d4e7b034ab3fde48079a9c4242793cde85af6ee9cf5c2eb608494f0f1ca090986a6ad8f9dde330f841a4915506acd9f451b95be83f27906072f

  • SSDEEP

    24576:ytr4m51+WtE03b8tud2JdFUji7CXQqWKxiHTPbQnCr0k:tJWu0gtuYhUjiMWOiHbEnCrv

Malware Config

Targets

    • Target

      e3550ca2582b25b317c0986a52fcc62aaa5d9276de29f2fd3ffc4271f574fe36.bin

    • Size

      2.6MB

    • MD5

      58f6382594c17138dfce9dfc4d0f0bea

    • SHA1

      9cfe23681990c1946bfaae57cc5114c32b33c766

    • SHA256

      e3550ca2582b25b317c0986a52fcc62aaa5d9276de29f2fd3ffc4271f574fe36

    • SHA512

      fec75f9571a90d4e7b034ab3fde48079a9c4242793cde85af6ee9cf5c2eb608494f0f1ca090986a6ad8f9dde330f841a4915506acd9f451b95be83f27906072f

    • SSDEEP

      24576:ytr4m51+WtE03b8tud2JdFUji7CXQqWKxiHTPbQnCr0k:tJWu0gtuYhUjiMWOiHbEnCrv

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks