General
-
Target
BlackMart.apk
-
Size
8.5MB
-
Sample
240928-z4awcazbpf
-
MD5
1f51442ac69949a896f13e42c4d7254a
-
SHA1
dac18bf7ac2dae640c064fe2563e4e32011144b4
-
SHA256
94be86d50af2ded5b2754cc2f0eeb8d26c44878b6835cb6292abf35df92bd4fa
-
SHA512
aaaaecb86f62c6602876a728101dc1604b57b887d788cf3dde66573a101be96301b80be3cbea21eaec9bf3021b335c0bb8964c73e7e5fc95d06cc4d382bec089
-
SSDEEP
196608:nxgE8qnpvtBIH7qu3G7roKx2NIXfT2+dMwW+dMwI+dMwE+dMww+dMws:nxOeHIH7R3G7rp4k2qMwWqMwIqMwEqMj
Behavioral task
behavioral1
Sample
BlackMart.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
BlackMart.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
BlackMart.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
rafelrat
https://kami1234.000webhostapp.com/public/commands.php
Targets
-
-
Target
BlackMart.apk
-
Size
8.5MB
-
MD5
1f51442ac69949a896f13e42c4d7254a
-
SHA1
dac18bf7ac2dae640c064fe2563e4e32011144b4
-
SHA256
94be86d50af2ded5b2754cc2f0eeb8d26c44878b6835cb6292abf35df92bd4fa
-
SHA512
aaaaecb86f62c6602876a728101dc1604b57b887d788cf3dde66573a101be96301b80be3cbea21eaec9bf3021b335c0bb8964c73e7e5fc95d06cc4d382bec089
-
SSDEEP
196608:nxgE8qnpvtBIH7qu3G7roKx2NIXfT2+dMwW+dMwI+dMwE+dMww+dMws:nxOeHIH7R3G7rp4k2qMwWqMwIqMwEqMj
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Legitimate hosting services abused for malware hosting/C2
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests accessing notifications (often used to intercept notifications before users become aware).
-