General

  • Target

    com_xs2theworld_cxmobile_v12.0.0.apk

  • Size

    71.3MB

  • Sample

    240610-qjn3sswhpf

  • MD5

    7546eed8dd7aafde18d7b755ea51e7d5

  • SHA1

    4d3415ca0c3f3c21265d01cded4691434b1730c0

  • SHA256

    ad483c666c8b0757bb4492312e906cb9ea30bb08eec78dce5cda5a501ed0d3c2

  • SHA512

    4bad8b3d78b7772d4020cfd3d17bb8fcab64eb96eb6dd02a941d8878222635cef373e151a60f8059d41aab4cab5ddb149cece59df62c04f2cbb24b74e9434fa8

  • SSDEEP

    786432:GK71Kcea9pmwQ7EKc+oRxN7E6cy0mlZyIiAIb7N9rd0/WYrC2H/x3xuZK9MO+8pX:a4SvoCIZyIiAIbJpkrC2fx3x+8pX

Malware Config

Targets

    • Target

      com_xs2theworld_cxmobile_v12.0.0.apk

    • Size

      71.3MB

    • MD5

      7546eed8dd7aafde18d7b755ea51e7d5

    • SHA1

      4d3415ca0c3f3c21265d01cded4691434b1730c0

    • SHA256

      ad483c666c8b0757bb4492312e906cb9ea30bb08eec78dce5cda5a501ed0d3c2

    • SHA512

      4bad8b3d78b7772d4020cfd3d17bb8fcab64eb96eb6dd02a941d8878222635cef373e151a60f8059d41aab4cab5ddb149cece59df62c04f2cbb24b74e9434fa8

    • SSDEEP

      786432:GK71Kcea9pmwQ7EKc+oRxN7E6cy0mlZyIiAIb7N9rd0/WYrC2H/x3xuZK9MO+8pX:a4SvoCIZyIiAIbJpkrC2fx3x+8pX

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks