General

  • Target

    BCApp_release_13Aug_v5.5.0.apk

  • Size

    16.7MB

  • Sample

    241113-p57xcsvren

  • MD5

    0969d551ab08a22e343ec92849e35300

  • SHA1

    6ec2e336130979dcf0a1730077c871533f9dce57

  • SHA256

    78961a477f1ab9591f45406be9223678bcec69e350720cf61a3938f6239bd86a

  • SHA512

    2f44f51be873b676b8f62e833159cba5c742c2a6524faf04c03254490344ab3f1c65ea708ec966af25579d0db9fd5d453c1acb3c15b0397720c4769d8bf48272

  • SSDEEP

    393216:kilu71M6rTxTFqQiuH7xxZUdBRgZhucT5wSb89:kilnUt7L7xx6dXAG

Malware Config

Targets

    • Target

      BCApp_release_13Aug_v5.5.0.apk

    • Size

      16.7MB

    • MD5

      0969d551ab08a22e343ec92849e35300

    • SHA1

      6ec2e336130979dcf0a1730077c871533f9dce57

    • SHA256

      78961a477f1ab9591f45406be9223678bcec69e350720cf61a3938f6239bd86a

    • SHA512

      2f44f51be873b676b8f62e833159cba5c742c2a6524faf04c03254490344ab3f1c65ea708ec966af25579d0db9fd5d453c1acb3c15b0397720c4769d8bf48272

    • SSDEEP

      393216:kilu71M6rTxTFqQiuH7xxZUdBRgZhucT5wSb89:kilnUt7L7xx6dXAG

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks