June 16, 2021



The analysis is shown using the most.app application as an example.

Traffic capturing showed the initial link and hop chain. In the traffic analyzer the chain of conversions looks like this:

Traffic analyzer screenshot

The complete chain of transitions looks like this:

  1. https://config.e-droid.net/srv/config.php?v=62&vname=9.8&idapp=1018143&idusu=0&cod_g=&pw=0&gp=0&am=0&idl=ru&pa_env=1&pa=RU&pn=most.app&fus=010100000000&aid=fd16101a9d4d0078
  2. http://mostbapp1.xyz/
  3. http://www.mostbapp1.xyz/
  4. https://rnpuq9gkmst.com/luDS/0/UA
  5. https://nphhy44kummst.com/?registration=1&cid=588394564&pid=29050&sip=0

The process of traffic analysis looks like this:

Traffic analysis video

With an initial link in the https://config.e-droid.net/srv/config.php chain, you can move on to code analysis.

Screenshot of the code using the initial link


The result of the analysis is YARA rules based on the links found and the strings unique to this type of application.

Yara rules: https://pastebin.com/BkWZRLqi

Password: jAjNk4tcMC