General
-
Target
Snaptube_20241001.apk
-
Size
28.6MB
-
Sample
241001-125tdawgrh
-
MD5
f100f3493e45ece4bf39ef8ec27cdcf0
-
SHA1
278cc31585000c85d310048551651390f6f676ed
-
SHA256
d0d91a9d717f090933798615123ba70acf320661e2aeb4902c0809b13af99fb8
-
SHA512
c25183faaa0d8ac86fed6c80064265a39d42c4a19a48b5e58d85ef23e56957b630b0fc83f374737615e9ea04e6f1989a8f4f8eb1e952b0da3516b3e6a2db0670
-
SSDEEP
393216:28htbbojR+kTTgP9hHNf1WCHngWw5q905ccoIMC4syNJ+OKmYfZOrV3TcKx:tboVxcNfUCw5q9kcjtKmYfZYjf
Static task
static1
Behavioral task
behavioral1
Sample
Snaptube_20241001.apk
Resource
android-x86-arm-20240910-en
Malware Config
Targets
-
-
Target
Snaptube_20241001.apk
-
Size
28.6MB
-
MD5
f100f3493e45ece4bf39ef8ec27cdcf0
-
SHA1
278cc31585000c85d310048551651390f6f676ed
-
SHA256
d0d91a9d717f090933798615123ba70acf320661e2aeb4902c0809b13af99fb8
-
SHA512
c25183faaa0d8ac86fed6c80064265a39d42c4a19a48b5e58d85ef23e56957b630b0fc83f374737615e9ea04e6f1989a8f4f8eb1e952b0da3516b3e6a2db0670
-
SSDEEP
393216:28htbbojR+kTTgP9hHNf1WCHngWw5q905ccoIMC4syNJ+OKmYfZOrV3TcKx:tboVxcNfUCw5q9kcjtKmYfZYjf
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Checks the presence of a debugger
-