General

  • Target

    DixMax-2.4.apk

  • Size

    13.7MB

  • Sample

    240901-vj3y6sxcjd

  • MD5

    860583165cbf414981234281e089853c

  • SHA1

    24da2d06de3976bfe604e6d49958657407fa4106

  • SHA256

    5c0d9cf7d00522f54c849e849460dad53e247a167d71938a356dd5ccd1200ff1

  • SHA512

    a0188e71f9de56cbb4208ce5f14e4948a3577f4b1c33359c03b960115cfdeec913049e2c74a15122bb09e000e1f561b3e12b44cbde5a7d3cbb40eec304bc9c78

  • SSDEEP

    196608:GNJIyTQeyvph5X65MTH9iJjR4rhxFCACmQN6x8+BXEUjuw:SIyEe0hsiL4p8XjQc++B4w

Malware Config

Targets

    • Target

      DixMax-2.4.apk

    • Size

      13.7MB

    • MD5

      860583165cbf414981234281e089853c

    • SHA1

      24da2d06de3976bfe604e6d49958657407fa4106

    • SHA256

      5c0d9cf7d00522f54c849e849460dad53e247a167d71938a356dd5ccd1200ff1

    • SHA512

      a0188e71f9de56cbb4208ce5f14e4948a3577f4b1c33359c03b960115cfdeec913049e2c74a15122bb09e000e1f561b3e12b44cbde5a7d3cbb40eec304bc9c78

    • SSDEEP

      196608:GNJIyTQeyvph5X65MTH9iJjR4rhxFCACmQN6x8+BXEUjuw:SIyEe0hsiL4p8XjQc++B4w

    Score
    8/10
    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks