General

  • Target

    xManager.apk

  • Size

    9.7MB

  • Sample

    240629-arxrxawelc

  • MD5

    dda7955961d7cda5c547749a6d3f0cac

  • SHA1

    ee01a2de8f11b2aa538d40900fd99cc9b5c8a793

  • SHA256

    75d294fddbdb6cca8d366f85ed4af34d72fa10ac451844be33c0e296030dfa32

  • SHA512

    d7f0143b037ffee0ea89f9b41a04ce47abdf957cb9015fbda41a59f51ad2d2b3c72ca88b9c9814fbcd9dc5f302ef6c8b21747e58ec431cafde2f81e5b452f4cb

  • SSDEEP

    196608:30OO/AEIo/pBp7GKwrVztF7MwVUVMaC8XIaZA5:3M/86bxsVz77MwnwIeA5

Malware Config

Targets

    • Target

      xManager.apk

    • Size

      9.7MB

    • MD5

      dda7955961d7cda5c547749a6d3f0cac

    • SHA1

      ee01a2de8f11b2aa538d40900fd99cc9b5c8a793

    • SHA256

      75d294fddbdb6cca8d366f85ed4af34d72fa10ac451844be33c0e296030dfa32

    • SHA512

      d7f0143b037ffee0ea89f9b41a04ce47abdf957cb9015fbda41a59f51ad2d2b3c72ca88b9c9814fbcd9dc5f302ef6c8b21747e58ec431cafde2f81e5b452f4cb

    • SSDEEP

      196608:30OO/AEIo/pBp7GKwrVztF7MwVUVMaC8XIaZA5:3M/86bxsVz77MwnwIeA5

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

MITRE ATT&CK Matrix

Tasks