General

  • Target

    10923c2e21441899046d05b7089cee6eeb5eb0d0f00dd1137337759961620b7e.bin

  • Size

    4.6MB

  • Sample

    250403-1zxpzsxnw2

  • MD5

    4f61a56b390d7fbd7964530dd4d9cdc7

  • SHA1

    32c93d7ece720f9b17656bdfd927815f52efa85b

  • SHA256

    10923c2e21441899046d05b7089cee6eeb5eb0d0f00dd1137337759961620b7e

  • SHA512

    ade03f288fa1e4cffa111724c24cc4a8cbe2d995681a4986860c19a3609496dc52c56311c85528dec799b6c804b17d84203d09f73ee81d71d6e28eace88af703

  • SSDEEP

    49152:vAJWu04F3r8PtLxej5aC+IGuK9wZdR5KmUS1Nm:YcHmuIVK9wZ/5Kim

Malware Config

Targets

    • Target

      10923c2e21441899046d05b7089cee6eeb5eb0d0f00dd1137337759961620b7e.bin

    • Size

      4.6MB

    • MD5

      4f61a56b390d7fbd7964530dd4d9cdc7

    • SHA1

      32c93d7ece720f9b17656bdfd927815f52efa85b

    • SHA256

      10923c2e21441899046d05b7089cee6eeb5eb0d0f00dd1137337759961620b7e

    • SHA512

      ade03f288fa1e4cffa111724c24cc4a8cbe2d995681a4986860c19a3609496dc52c56311c85528dec799b6c804b17d84203d09f73ee81d71d6e28eace88af703

    • SSDEEP

      49152:vAJWu04F3r8PtLxej5aC+IGuK9wZdR5KmUS1Nm:YcHmuIVK9wZ/5Kim

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks