General

  • Target

    xManager.apk

  • Size

    9.6MB

  • Sample

    241123-gsbpdswndj

  • MD5

    b6a14a183748d5c5ea8f332ad7704265

  • SHA1

    fdefb5e5f4d2de0fa6fe8583376d23d6fd7f8f9c

  • SHA256

    901eae37c506484e432c8dd3d96b8cc52063cca98dfc65e7318545d0ac90369c

  • SHA512

    b1621f7e37e8dbd7a8f834a86eac24f4224ea29a69c414c20752316889c4ac85d2e341833a648d24ed03c9c452125917cee58d8b2a8674cb8dab256af8d897e5

  • SSDEEP

    196608:pI3O/AEIo/pBp7GKwMVztF7MwVUVMaC8X2Pf33:pJ/86bx7Vz77Mwnw2Pf33

Malware Config

Targets

    • Target

      xManager.apk

    • Size

      9.6MB

    • MD5

      b6a14a183748d5c5ea8f332ad7704265

    • SHA1

      fdefb5e5f4d2de0fa6fe8583376d23d6fd7f8f9c

    • SHA256

      901eae37c506484e432c8dd3d96b8cc52063cca98dfc65e7318545d0ac90369c

    • SHA512

      b1621f7e37e8dbd7a8f834a86eac24f4224ea29a69c414c20752316889c4ac85d2e341833a648d24ed03c9c452125917cee58d8b2a8674cb8dab256af8d897e5

    • SSDEEP

      196608:pI3O/AEIo/pBp7GKwMVztF7MwVUVMaC8X2Pf33:pJ/86bx7Vz77Mwnw2Pf33

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks