General

  • Target

    1289995a5ce4623b288106e6a98448bc7859bd452ddfd33703399362db18659f.bin

  • Size

    2.6MB

  • Sample

    250403-1zzvcaxnw5

  • MD5

    246f4002ebdc7f3eac3044799af301d5

  • SHA1

    46bd2208878fc72016e7155f872fea7b74a030ed

  • SHA256

    1289995a5ce4623b288106e6a98448bc7859bd452ddfd33703399362db18659f

  • SHA512

    29ad303e4bd9e30c65df3695ab864ed8958cffab5570d196a5443b47062f8c1986398e110a17a3edd980139b39f9c2e6509761bbf0c8f639650daf19f5bff9b6

  • SSDEEP

    24576:d4m51+WtE0Tmv8iZ32NNl4jo29SD/mzONPJrpjhDpvVq5rKKPqXbl9FpGPg69nf6:+JWu0To2NI9SDjPHj3ONCkm

Malware Config

Targets

    • Target

      1289995a5ce4623b288106e6a98448bc7859bd452ddfd33703399362db18659f.bin

    • Size

      2.6MB

    • MD5

      246f4002ebdc7f3eac3044799af301d5

    • SHA1

      46bd2208878fc72016e7155f872fea7b74a030ed

    • SHA256

      1289995a5ce4623b288106e6a98448bc7859bd452ddfd33703399362db18659f

    • SHA512

      29ad303e4bd9e30c65df3695ab864ed8958cffab5570d196a5443b47062f8c1986398e110a17a3edd980139b39f9c2e6509761bbf0c8f639650daf19f5bff9b6

    • SSDEEP

      24576:d4m51+WtE0Tmv8iZ32NNl4jo29SD/mzONPJrpjhDpvVq5rKKPqXbl9FpGPg69nf6:+JWu0To2NI9SDjPHj3ONCkm

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks