General

  • Target

    Root-Device.ruanixart_821-pro.apk

  • Size

    28.6MB

  • Sample

    241123-hpxm5axjam

  • MD5

    e2b7534d3b5334ee255237b811d911e2

  • SHA1

    0c96467b4c6f85050f243338ac9e4eebd640fe91

  • SHA256

    ada4d3f2e4b4ee8526bf0a75e929e835f2a13cfa22e91bb3d1e0cebd2966211e

  • SHA512

    de14f6deb28edfb9d49ca69c6881a20b853db7495dd65cadf913dacc660ad8878bc19425af72e04dc7c385b4ad5180ee05b571f584cd1be1d0adf41bbfc9a35c

  • SSDEEP

    786432:3kIGziHALewX6drhLwCIzYHfi5LewXUN2+E/:WzkALRXa5wCIEa5LRXU/8

Malware Config

Targets

    • Target

      Root-Device.ruanixart_821-pro.apk

    • Size

      28.6MB

    • MD5

      e2b7534d3b5334ee255237b811d911e2

    • SHA1

      0c96467b4c6f85050f243338ac9e4eebd640fe91

    • SHA256

      ada4d3f2e4b4ee8526bf0a75e929e835f2a13cfa22e91bb3d1e0cebd2966211e

    • SHA512

      de14f6deb28edfb9d49ca69c6881a20b853db7495dd65cadf913dacc660ad8878bc19425af72e04dc7c385b4ad5180ee05b571f584cd1be1d0adf41bbfc9a35c

    • SSDEEP

      786432:3kIGziHALewX6drhLwCIzYHfi5LewXUN2+E/:WzkALRXa5wCIEa5LRXU/8

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Declares services with permission to bind to the system

    • Queries information about active data network

    • Reads information about phone network operator.

    • Requests dangerous framework permissions

    • Target

      origin.apk

    • Size

      14.0MB

    • MD5

      8eca086ea5b3f827f937eb45220d40da

    • SHA1

      047fcd8aac30dcdac5dd75c2bd98f6d93528525a

    • SHA256

      3d4c2d33b41fe8fc94d4338bcfa7c26db0a27ed89806d4cfccf4aac19450c07e

    • SHA512

      78c5dfc34aef9b99984cc4c2189733a5dd4a847e4471dd91fc63fae8e6d9b00fff1e0c07cae3a0d3a3ea80348b5ed1979c3a31314bd72f54d87cd8dd54c01eda

    • SSDEEP

      393216:sakff4Gz5azHtUibv92LE7wXZuvnjhrhLA:zkIGziHALewX6drhLA

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks