General

  • Target

    Snaptube_20241001.apk

  • Size

    28.6MB

  • Sample

    241001-125tdawgrh

  • MD5

    f100f3493e45ece4bf39ef8ec27cdcf0

  • SHA1

    278cc31585000c85d310048551651390f6f676ed

  • SHA256

    d0d91a9d717f090933798615123ba70acf320661e2aeb4902c0809b13af99fb8

  • SHA512

    c25183faaa0d8ac86fed6c80064265a39d42c4a19a48b5e58d85ef23e56957b630b0fc83f374737615e9ea04e6f1989a8f4f8eb1e952b0da3516b3e6a2db0670

  • SSDEEP

    393216:28htbbojR+kTTgP9hHNf1WCHngWw5q905ccoIMC4syNJ+OKmYfZOrV3TcKx:tboVxcNfUCw5q9kcjtKmYfZYjf

Malware Config

Targets

    • Target

      Snaptube_20241001.apk

    • Size

      28.6MB

    • MD5

      f100f3493e45ece4bf39ef8ec27cdcf0

    • SHA1

      278cc31585000c85d310048551651390f6f676ed

    • SHA256

      d0d91a9d717f090933798615123ba70acf320661e2aeb4902c0809b13af99fb8

    • SHA512

      c25183faaa0d8ac86fed6c80064265a39d42c4a19a48b5e58d85ef23e56957b630b0fc83f374737615e9ea04e6f1989a8f4f8eb1e952b0da3516b3e6a2db0670

    • SSDEEP

      393216:28htbbojR+kTTgP9hHNf1WCHngWw5q905ccoIMC4syNJ+OKmYfZOrV3TcKx:tboVxcNfUCw5q9kcjtKmYfZYjf

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks