General

  • Target

    Downloading app.revanced.android.youtube

  • Size

    158.4MB

  • Sample

    250508-redxpsvjw6

  • MD5

    1b78ae5bc78c78c60eddfd2f2ad5a212

  • SHA1

    8936464ac34272cbac97472dddb6af9dd09083b6

  • SHA256

    6c9454fc045130abb77698186eeaed6ff9b274676847043842037983cc83c271

  • SHA512

    2bd171651210dc040b7fd488e1280c30723512191c6d5e33b8f9c3e213203a7b706ca79e7fc8df29a7344b216b05c45fc70d33b1d93aa722471118667abb95df

  • SSDEEP

    3145728:TqAm3IWkiAx+B7w0IMOztxHmiXbxosDTIHRYHws+UBIFAJnOVbv4aqltu1C:T2VkiAxs7tERxGiXtosD8xCZiimMlg8

Malware Config

Targets

    • Target

      Downloading app.revanced.android.youtube

    • Size

      158.4MB

    • MD5

      1b78ae5bc78c78c60eddfd2f2ad5a212

    • SHA1

      8936464ac34272cbac97472dddb6af9dd09083b6

    • SHA256

      6c9454fc045130abb77698186eeaed6ff9b274676847043842037983cc83c271

    • SHA512

      2bd171651210dc040b7fd488e1280c30723512191c6d5e33b8f9c3e213203a7b706ca79e7fc8df29a7344b216b05c45fc70d33b1d93aa722471118667abb95df

    • SSDEEP

      3145728:TqAm3IWkiAx+B7w0IMOztxHmiXbxosDTIHRYHws+UBIFAJnOVbv4aqltu1C:T2VkiAxs7tERxGiXtosD8xCZiimMlg8

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

MITRE ATT&CK Mobile v16

Tasks

OSZAR »