General

  • Target

    Snaptube_comsnaptubepremium_713071350310.apk

  • Size

    19.1MB

  • Sample

    241109-n8cd7atgpb

  • MD5

    dad7b2b90f76a838f1e4ab64ac8e0142

  • SHA1

    280235571e34cdd53f390363a5f0ce25cefb8148

  • SHA256

    dfa1458cfc3a6b3c110dc8f200b017adbc672ad6a3b861ee1899f62642a06ce7

  • SHA512

    6c27cf662449f50267e402885bf2cc4462e1df7984ba805b209cbd829a108333612c36c12be324618b5d033b03bf4064f57d565a01db5a17e682983512c05af2

  • SSDEEP

    393216:1Q+i9eou0TDTurLX9g/T0/MUSxxCEEMNuCkLQVwPkpTPGP3KtzmhI66cbH0uA:1Q+i4t0TDT0rm/ZB0SNILQVw8poKtzmK

Malware Config

Targets

    • Target

      Snaptube_comsnaptubepremium_713071350310.apk

    • Size

      19.1MB

    • MD5

      dad7b2b90f76a838f1e4ab64ac8e0142

    • SHA1

      280235571e34cdd53f390363a5f0ce25cefb8148

    • SHA256

      dfa1458cfc3a6b3c110dc8f200b017adbc672ad6a3b861ee1899f62642a06ce7

    • SHA512

      6c27cf662449f50267e402885bf2cc4462e1df7984ba805b209cbd829a108333612c36c12be324618b5d033b03bf4064f57d565a01db5a17e682983512c05af2

    • SSDEEP

      393216:1Q+i9eou0TDTurLX9g/T0/MUSxxCEEMNuCkLQVwPkpTPGP3KtzmhI66cbH0uA:1Q+i4t0TDT0rm/ZB0SNILQVw8poKtzmK

    • Checks if the Android device is rooted.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks