General

  • Target

    xnxx-STABLE-1.40.apk

  • Size

    7.5MB

  • Sample

    241113-nzj3nsvkdp

  • MD5

    9a593df934a70fda9a7b3664242b0c69

  • SHA1

    a635b03eb4e8ce025c57f23fb6f516e8971fc12c

  • SHA256

    d4a407c2fa61405024f9312baba81f778b6d38aae84bd759f97c185146e095be

  • SHA512

    9e90347081bc05e0035ba218c7132381ad8cf4d900941616c294a81b7d41ff7b3058b30f61e36ba2f5baed5c56857e8ebf6127198bf5285e2c66b424ddaf606d

  • SSDEEP

    98304:HEnSHAPAPSiwQp42voRt1kuj2SM6G83Fg+ONK4FsBzd2nYRAj96kqvvimiGr1OhP:kSgPAPfLxu3Fg+OKV2nYA96D0hlA3a

Malware Config

Targets

    • Target

      xnxx-STABLE-1.40.apk

    • Size

      7.5MB

    • MD5

      9a593df934a70fda9a7b3664242b0c69

    • SHA1

      a635b03eb4e8ce025c57f23fb6f516e8971fc12c

    • SHA256

      d4a407c2fa61405024f9312baba81f778b6d38aae84bd759f97c185146e095be

    • SHA512

      9e90347081bc05e0035ba218c7132381ad8cf4d900941616c294a81b7d41ff7b3058b30f61e36ba2f5baed5c56857e8ebf6127198bf5285e2c66b424ddaf606d

    • SSDEEP

      98304:HEnSHAPAPSiwQp42voRt1kuj2SM6G83Fg+ONK4FsBzd2nYRAj96kqvvimiGr1OhP:kSgPAPfLxu3Fg+OKV2nYA96D0hlA3a

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks