HenBox is Android malware that attempts to only execute on Xiaomi devices running the MIUI operating system. HenBox has primarily been used to target Uyghurs, a minority Turkic ethnic group.[1]
HenBox can access the device’s microphone.[1]
HenBox can run commands as root.[1]
HenBox can steal data from various sources, including chat, communication, and social media apps.[1]
HenBox can load additional Dalvik code while running.[1]
HenBox has registered several broadcast receivers.[1]
HenBox can track the device’s location.[1]
HenBox has masqueraded as VPN and Android system apps.[1]
HenBox has contained native libraries.[1]
HenBox has obfuscated components using XOR, ZIP with a single-byte key or ZIP/Zlib compression wrapped with RC4 encryption.[1]
HenBox can obtain a list of running processes.[1]
HenBox has collected all outgoing phone numbers that start with "86".[1]
HenBox can access the device’s contact list.[1]
HenBox can intercept SMS messages.[1]
HenBox can obtain a list of running apps.[1]
HenBox can collect device information and can check if the device is running MIUI on a Xiaomi device.[1]
HenBox can access the device’s camera.[1]
HenBox can detect if the app is running on an emulator.[1]