General
-
Target
Vidma editor v2.11.0 modded by Mixroot.apk
-
Size
77.6MB
-
Sample
240605-rnnhhaad36
-
MD5
33e9bd8b7884a88d617e188a4fd61fd5
-
SHA1
3a1f8dc06deceee2df2d7f415061283630c9cb23
-
SHA256
c8171eaa7aa92e5e2933bbb32f8e2637dcfa7c693b620877f60d9f0e79188441
-
SHA512
91932940d99aaea249752d83e19c1345655329f4bec61afc98e7c31913dd9b55e9c42cd7a3cb130e63725441842f962e242bdb146e622213d31681080d90d725
-
SSDEEP
1572864:S1x9D1UYxaRPD1awsxkRa1RHEhypXrBH8G8DEAeHcrQijzFcWswamqSBB5C4//Gs:SlDa/RPD15MIa1Vl9rBHBAe8rQiXFchU
Static task
static1
Behavioral task
behavioral1
Sample
Vidma editor v2.11.0 modded by Mixroot.apk
Resource
android-33-x64-arm64-20240603-en
Malware Config
Targets
-
-
Target
Vidma editor v2.11.0 modded by Mixroot.apk
-
Size
77.6MB
-
MD5
33e9bd8b7884a88d617e188a4fd61fd5
-
SHA1
3a1f8dc06deceee2df2d7f415061283630c9cb23
-
SHA256
c8171eaa7aa92e5e2933bbb32f8e2637dcfa7c693b620877f60d9f0e79188441
-
SHA512
91932940d99aaea249752d83e19c1345655329f4bec61afc98e7c31913dd9b55e9c42cd7a3cb130e63725441842f962e242bdb146e622213d31681080d90d725
-
SSDEEP
1572864:S1x9D1UYxaRPD1awsxkRa1RHEhypXrBH8G8DEAeHcrQijzFcWswamqSBB5C4//Gs:SlDa/RPD15MIa1Vl9rBHBAe8rQiXFchU
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
1System Checks
1