General

  • Target

    Vidma editor v2.11.0 modded by Mixroot.apk

  • Size

    77.6MB

  • Sample

    240605-rnnhhaad36

  • MD5

    33e9bd8b7884a88d617e188a4fd61fd5

  • SHA1

    3a1f8dc06deceee2df2d7f415061283630c9cb23

  • SHA256

    c8171eaa7aa92e5e2933bbb32f8e2637dcfa7c693b620877f60d9f0e79188441

  • SHA512

    91932940d99aaea249752d83e19c1345655329f4bec61afc98e7c31913dd9b55e9c42cd7a3cb130e63725441842f962e242bdb146e622213d31681080d90d725

  • SSDEEP

    1572864:S1x9D1UYxaRPD1awsxkRa1RHEhypXrBH8G8DEAeHcrQijzFcWswamqSBB5C4//Gs:SlDa/RPD15MIa1Vl9rBHBAe8rQiXFchU

Malware Config

Targets

    • Target

      Vidma editor v2.11.0 modded by Mixroot.apk

    • Size

      77.6MB

    • MD5

      33e9bd8b7884a88d617e188a4fd61fd5

    • SHA1

      3a1f8dc06deceee2df2d7f415061283630c9cb23

    • SHA256

      c8171eaa7aa92e5e2933bbb32f8e2637dcfa7c693b620877f60d9f0e79188441

    • SHA512

      91932940d99aaea249752d83e19c1345655329f4bec61afc98e7c31913dd9b55e9c42cd7a3cb130e63725441842f962e242bdb146e622213d31681080d90d725

    • SSDEEP

      1572864:S1x9D1UYxaRPD1awsxkRa1RHEhypXrBH8G8DEAeHcrQijzFcWswamqSBB5C4//Gs:SlDa/RPD15MIa1Vl9rBHBAe8rQiXFchU

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks