June 24, 2021
com.sumappgame.vnight io.cherry.golden
Introduction
Previous report: https://teletype.in/@hawkeye/NGovaUm7LAk
We've used Ukrainian IP address to get those results.
Analysis
Both applications have the same algorithm and the same chain of redirects:
The complete chain of transitions looks like this:
- https://adspartners.net/v1/r/ads?appId=.....
- https://fruktwalk.ru/......
- https://ahufgtds.com/fruitwalk/vlknlndua?param={atp}&clickid=.....
- https://huffsongpp.live/vulkanua/p18001/?atp=%7Batp%7D&goto=....
With an initial link in the https://adspartners.net chain, you can move on to code analysis. The part of the code where the full reference is used was used to write the yara rules:
Both applications have methods named "startWeb", which were used to write the Yara rules.
Conclusion
The result of the analysis is YARA rules based on the links found and the strings unique to this type of application.
Yara rules: https://pastebin.com/rEFmkU44
Password: 79t2t4hqWt