General

  • Target

    51161f3eb2753376f950e1d14817772c205cfc4642105360fd552be8ee49a655.bin

  • Size

    2.6MB

  • Sample

    250403-1ztnbsvwaz

  • MD5

    5aab4317038fa3e7fc448af337ef0b55

  • SHA1

    8c3e9efdccf03e61a78154233994e71250beb4d5

  • SHA256

    51161f3eb2753376f950e1d14817772c205cfc4642105360fd552be8ee49a655

  • SHA512

    9eda81134eeffa2920ff29c11a616c3567bf9c358cf9e8e42708632bbbc1c3da7d493ed351e782f1bf8f3d0e4259a6d67f8c1e76cf0277f4412cd55309f0818c

  • SSDEEP

    24576:ytr4m51+WtE03b8tud2JdFUji7CXQqWKxiHTPbQnCPqPfY:tJWu0gtuYhUjiMWOiHbEnCPb

Malware Config

Targets

    • Target

      51161f3eb2753376f950e1d14817772c205cfc4642105360fd552be8ee49a655.bin

    • Size

      2.6MB

    • MD5

      5aab4317038fa3e7fc448af337ef0b55

    • SHA1

      8c3e9efdccf03e61a78154233994e71250beb4d5

    • SHA256

      51161f3eb2753376f950e1d14817772c205cfc4642105360fd552be8ee49a655

    • SHA512

      9eda81134eeffa2920ff29c11a616c3567bf9c358cf9e8e42708632bbbc1c3da7d493ed351e782f1bf8f3d0e4259a6d67f8c1e76cf0277f4412cd55309f0818c

    • SSDEEP

      24576:ytr4m51+WtE03b8tud2JdFUji7CXQqWKxiHTPbQnCPqPfY:tJWu0gtuYhUjiMWOiHbEnCPb

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks