General

  • Target

    Yandeks-Muzyka-PLUS-2024.08.1.apk

  • Size

    27.1MB

  • Sample

    240821-w6tvfsterd

  • MD5

    3c5135a445800203cdc2ac6a41ef63bb

  • SHA1

    21c00e133dbca03a32a876b89d87fceff7262632

  • SHA256

    a78b414a6041eb20525636000d1d7e9101d227b4f9953c337fc7bd2c108c7fcf

  • SHA512

    d5a4744f826f0ad073cd5ca0dfda6fd98ac41c721d01700b9237a2c46021abc836dd7416aecdc706eda62236f936aa5d9ef63ab3997df8b2aa99899699c7e17f

  • SSDEEP

    786432:eBf296MxQ1NHnMgHkT2dUpDZm2aOUJnUpsB988:e9293abHzHLdUpDZm2spUpcn

Malware Config

Targets

    • Target

      Yandeks-Muzyka-PLUS-2024.08.1.apk

    • Size

      27.1MB

    • MD5

      3c5135a445800203cdc2ac6a41ef63bb

    • SHA1

      21c00e133dbca03a32a876b89d87fceff7262632

    • SHA256

      a78b414a6041eb20525636000d1d7e9101d227b4f9953c337fc7bd2c108c7fcf

    • SHA512

      d5a4744f826f0ad073cd5ca0dfda6fd98ac41c721d01700b9237a2c46021abc836dd7416aecdc706eda62236f936aa5d9ef63ab3997df8b2aa99899699c7e17f

    • SSDEEP

      786432:eBf296MxQ1NHnMgHkT2dUpDZm2aOUJnUpsB988:e9293abHzHLdUpDZm2spUpcn

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Acquires the wake lock

    • Queries information about active data network

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks