General
-
Target
Yandeks-Muzyka-PLUS-2024.08.1.apk
-
Size
27.1MB
-
Sample
240821-w6tvfsterd
-
MD5
3c5135a445800203cdc2ac6a41ef63bb
-
SHA1
21c00e133dbca03a32a876b89d87fceff7262632
-
SHA256
a78b414a6041eb20525636000d1d7e9101d227b4f9953c337fc7bd2c108c7fcf
-
SHA512
d5a4744f826f0ad073cd5ca0dfda6fd98ac41c721d01700b9237a2c46021abc836dd7416aecdc706eda62236f936aa5d9ef63ab3997df8b2aa99899699c7e17f
-
SSDEEP
786432:eBf296MxQ1NHnMgHkT2dUpDZm2aOUJnUpsB988:e9293abHzHLdUpDZm2spUpcn
Static task
static1
Behavioral task
behavioral1
Sample
Yandeks-Muzyka-PLUS-2024.08.1.apk
Resource
android-x86-arm-20240624-en
Malware Config
Targets
-
-
Target
Yandeks-Muzyka-PLUS-2024.08.1.apk
-
Size
27.1MB
-
MD5
3c5135a445800203cdc2ac6a41ef63bb
-
SHA1
21c00e133dbca03a32a876b89d87fceff7262632
-
SHA256
a78b414a6041eb20525636000d1d7e9101d227b4f9953c337fc7bd2c108c7fcf
-
SHA512
d5a4744f826f0ad073cd5ca0dfda6fd98ac41c721d01700b9237a2c46021abc836dd7416aecdc706eda62236f936aa5d9ef63ab3997df8b2aa99899699c7e17f
-
SSDEEP
786432:eBf296MxQ1NHnMgHkT2dUpDZm2aOUJnUpsB988:e9293abHzHLdUpDZm2spUpcn
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Acquires the wake lock
-
Queries information about active data network
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-