Analysis
-
max time kernel
162s -
max time network
159s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
24-05-2024 12:41
Static task
static1
Behavioral task
behavioral1
Sample
0e6621aa2b777898c0e078f7ec4b8a046af02ee6432f0f7b1867646ea391d5e1.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
259621886.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
bdxadsdk.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
bdxadsdk.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral5
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x86-arm-20240514-en
General
-
Target
0e6621aa2b777898c0e078f7ec4b8a046af02ee6432f0f7b1867646ea391d5e1.apk
-
Size
36.1MB
-
MD5
ad87cb6841e2958983ef9af340d0d1f0
-
SHA1
0dbd2966090e67166d45636634ff04737ada3c13
-
SHA256
0e6621aa2b777898c0e078f7ec4b8a046af02ee6432f0f7b1867646ea391d5e1
-
SHA512
4ee2b1170484a3817c7241ba23708cec0d31d2d438019e2f0f0612c1f4486711903030bf10f89a57357214f10be040fc6413db27cc2c5bebad192089d5a9110b
-
SSDEEP
786432:hw7M9b3zvZ6uz4pRYuUoZmuHD/dvyuLbC1yX6hN0Umwy8K0Mzz6BAirYCSF:hhzWYuUYmuHD/dv41yX6hGlqKFzMrNo
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 2 IoCs
Processes:
com.xingxing.xxspdyioc process /system/bin/su com.xingxing.xxspdy /system/xbin/su com.xingxing.xxspdy -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.xingxing.xxspdydescription ioc process File opened for read /proc/cpuinfo com.xingxing.xxspdy -
Queries information about running processes on the device 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
Processes:
com.xingxing.xxspdydescription ioc process Framework service call android.app.IActivityManager.getRunningAppProcesses com.xingxing.xxspdy -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.xingxing.xxspdydescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.xingxing.xxspdy -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.xingxing.xxspdydescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.xingxing.xxspdy -
Reads information about phone network operator. 1 TTPs
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
Processes:
com.xingxing.xxspdydescription ioc process Framework API call javax.crypto.Cipher.doFinal com.xingxing.xxspdy
Processes
-
com.xingxing.xxspdy1⤵
- Checks if the Android device is rooted.
- Checks CPU information
- Queries information about running processes on the device
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks if the internet connection is available
- Uses Crypto APIs (Might try to encrypt user data)
PID:4282 -
ping www.baidu.com2⤵PID:4356
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31B
MD58c92de9ce46d41a22f3b20f77404cc1d
SHA18671a6dca00edb72be47363a7071be65cf270373
SHA25668bb33ddeed9200be85a71f70b377985f9ee68e91578afbde8321463396f1274
SHA51230f45fe9954215d6adafcc8f0a060a7ff41963a64f9b849a37f0d18fe045038d429ec13bf15226769c4ba78dad3c52f3d9e0dbbb4fcdea4828a1efe956e48f56