General

  • Target

    BLACK RUSSIA_15.30.0.apk

  • Size

    99.1MB

  • Sample

    241129-q43fxsymez

  • MD5

    0a156fddfc24f98ed864a2d8938b2ba8

  • SHA1

    629c2deb7aed7ea614f9a4b3528f34ade54d4dc6

  • SHA256

    fab4604f8c479021dd07109ca03b1c467454a65ad2074fe44f4a3a553a97fb47

  • SHA512

    6b887493714914b0b2bf3e76fc023395c371c423c6599a49e0213c1e22e189d1eed3840b6b4a939df49db284fe48ba8007b0ea7eb748c6da1ccb8ec78bcea268

  • SSDEEP

    1572864:HUBSNaneLOY0K6QZXabQvA72MdfCmh4ZUp0H0XkAm0t9kFYFuY:HUB6asOY0x+eQo72s/uZS0UX79k2uY

Malware Config

Targets

    • Target

      BLACK RUSSIA_15.30.0.apk

    • Size

      99.1MB

    • MD5

      0a156fddfc24f98ed864a2d8938b2ba8

    • SHA1

      629c2deb7aed7ea614f9a4b3528f34ade54d4dc6

    • SHA256

      fab4604f8c479021dd07109ca03b1c467454a65ad2074fe44f4a3a553a97fb47

    • SHA512

      6b887493714914b0b2bf3e76fc023395c371c423c6599a49e0213c1e22e189d1eed3840b6b4a939df49db284fe48ba8007b0ea7eb748c6da1ccb8ec78bcea268

    • SSDEEP

      1572864:HUBSNaneLOY0K6QZXabQvA72MdfCmh4ZUp0H0XkAm0t9kFYFuY:HUB6asOY0x+eQo72s/uZS0UX79k2uY

    • Checks if the Android device is rooted.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks