General

  • Target

    xManager (2).apk

  • Size

    9.7MB

  • Sample

    250117-erfkva1pfs

  • MD5

    7f3208326d69262b35640f1854cca84e

  • SHA1

    44deb882adb7af063548dd8746c89ebc67a8ce3e

  • SHA256

    967daa70faf2bd992a674cf2764699ac92b5f7d54d4d858ed459f880f1ffabc9

  • SHA512

    e229e3977d55965d0d7a38967095cb2565cde21400ea9a804eb7e0f2154d2721c0b6c346e99dd2b7a05ddcd45c1a4e401cb2a6fc82e51257c4b898bdd4044d55

  • SSDEEP

    196608:f8Q2O/AEIo/pBp7GKw7VztF7MwVUVMaC8XhE:f8I/86bxMVz77MwnwhE

Malware Config

Targets

    • Target

      xManager (2).apk

    • Size

      9.7MB

    • MD5

      7f3208326d69262b35640f1854cca84e

    • SHA1

      44deb882adb7af063548dd8746c89ebc67a8ce3e

    • SHA256

      967daa70faf2bd992a674cf2764699ac92b5f7d54d4d858ed459f880f1ffabc9

    • SHA512

      e229e3977d55965d0d7a38967095cb2565cde21400ea9a804eb7e0f2154d2721c0b6c346e99dd2b7a05ddcd45c1a4e401cb2a6fc82e51257c4b898bdd4044d55

    • SSDEEP

      196608:f8Q2O/AEIo/pBp7GKw7VztF7MwVUVMaC8XhE:f8I/86bxMVz77MwnwhE

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.