General

  • Target

    xManager.apk

  • Size

    9MB

  • Sample

    231121-c7pscabf76

  • MD5

    336a619ce19dba5d7db2fda176ab2f94

  • SHA1

    dab46a0a1d748f71bad09beb8da18fe1f5f6aeb3

  • SHA256

    115bd2eea5dfc899725b80c77a55f19f17b79bd39595c8bafa8f83cdbda234f6

  • SHA512

    9b4de15413484b20154654fb886e3974a2c534edb422a85bed9d54e0ba20933ce9ed9dd40ec3dd5260e10ab6ec12c0df26ef3a123163eec10bbb1d6de5fabb43

  • SSDEEP

    196608:2cD3p5l1zC7D01iXnaxjLalmBTrVUDL4tny:2Y5X4HXXnaXrKDyny

Malware Config

Targets

    • Target

      xManager.apk

    • Size

      9MB

    • MD5

      336a619ce19dba5d7db2fda176ab2f94

    • SHA1

      dab46a0a1d748f71bad09beb8da18fe1f5f6aeb3

    • SHA256

      115bd2eea5dfc899725b80c77a55f19f17b79bd39595c8bafa8f83cdbda234f6

    • SHA512

      9b4de15413484b20154654fb886e3974a2c534edb422a85bed9d54e0ba20933ce9ed9dd40ec3dd5260e10ab6ec12c0df26ef3a123163eec10bbb1d6de5fabb43

    • SSDEEP

      196608:2cD3p5l1zC7D01iXnaxjLalmBTrVUDL4tny:2Y5X4HXXnaXrKDyny

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Reads information about phone network operator.

    • Removes a system notification.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks