| File name: | d33a46dbd1a5520f29e9a5cb00fd2468.apk |
| Full analysis: | https://app.any.run/tasks/9b8121be-fc89-49ee-83ae-7516b42496be |
| Verdict: | Malicious activity |
| Threats: | BTMOB RAT is a remote access Trojan (RAT) designed to give attackers full control over infected devices. It targets Windows and Android endpoints. Its modular structure allows operators to tailor capabilities, making it suitable for espionage, credential theft, financial fraud, and establishing long-term footholds in corporate networks. |
| Analysis date: | June 19, 2025, 14:00:38 |
| OS: | Android 14 |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.android.package-archive |
| File info: | Android package (APK), with classes.dex |
| MD5: | D33A46DBD1A5520F29E9A5CB00FD2468 |
| SHA1: | 93756DC6497F628989F08CA445174D75903F4CB9 |
| SHA256: | 720720CC5B1B894D55B97E16374D0F68EAA25CF9E26C4BA4C9E7CBABD413EF81 |
| SSDEEP: | 98304:eE5Ve94wga9xoU6J1yyswiQRf8ZyVlCayP2d+D2cw/Z0gHwJWvVs6spEGf8LBXPs:/ghg6PEIWPmdBFtrMJVJ7cWKBQyM0 |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 339 | /system/bin/netd | /system/bin/netd | init | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2267 | wolg.eslup.tsacdaorb | /system/bin/app_process64 | app_process64 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2306 | com.android.webview:webview_service | /system/bin/app_process64 | app_process64 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2319 | webview_zygote | /system/bin/app_process64 | — | app_process64 |
User: webview_zygote Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2361 | com.android.webview:webview_apk | /system/bin/app_process64 | app_process64 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2490 | com.android.systemui.accessibility.accessibilitymenu | /system/bin/app_process64 | — | app_process64 |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2552 | com.android.settings | /system/bin/app_process64 | — | app_process64 |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/no_backup/androidx.work.workdb-journal | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/shared_prefs/wolg.eslup.tsacdaorb.xml | xml | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/no_backup/androidx.work.workdb-wal | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/app_webview/last-exit-info | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/shared_prefs/WebViewChromiumPrefs.xml | xml | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/cache/WebView/Default/HTTP Cache/Code Cache/wasm/index | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/cache/WebView/Default/HTTP Cache/Code Cache/js/index | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/cache/WebView/Default/HTTP Cache/Code Cache/wasm/index-dir/temp-index | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/cache/WebView/Default/HTTP Cache/Code Cache/js/index-dir/temp-index | binary | |
MD5:— | SHA256:— | |||
| 2267 | app_process64 | /data/data/wolg.eslup.tsacdaorb/app_webview/Default/Web Data-journal | binary | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 142.250.184.227:80 | http://connectivitycheck.gstatic.com/generate_204 | unknown | — | — | whitelisted |
2267 | app_process64 | HEAD | 200 | 144.172.93.125:80 | http://144.172.93.125/yaarsa/private/yarsap_80541.php | unknown | — | — | unknown |
2267 | app_process64 | POST | 200 | 144.172.93.125:80 | http://144.172.93.125/yaarsa/private/yarsap_80541.php | unknown | — | — | unknown |
2267 | app_process64 | GET | 200 | 34.240.185.29:80 | http://checkip.amazonaws.com/ | unknown | — | — | whitelisted |
2267 | app_process64 | GET | 101 | 144.172.93.125:8080 | http://144.172.93.125:8080/ | unknown | — | — | unknown |
2267 | app_process64 | GET | 101 | 144.172.93.125:8080 | http://144.172.93.125:8080/ | unknown | — | — | unknown |
2267 | app_process64 | GET | — | 34.240.185.29:80 | http://checkip.amazonaws.com/ | unknown | — | — | whitelisted |
2267 | app_process64 | HEAD | 200 | 144.172.93.125:80 | http://144.172.93.125/yaarsa/private/yarsap_80541.php | unknown | — | — | unknown |
2267 | app_process64 | POST | 200 | 144.172.93.125:80 | http://144.172.93.125/yaarsa/private/yarsap_80541.php | unknown | — | — | unknown |
2267 | app_process64 | GET | 200 | 34.240.185.29:80 | http://checkip.amazonaws.com/ | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
451 | mdnsd | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 216.239.35.0:123 | time.android.com | — | — | whitelisted |
— | — | 142.250.184.227:80 | connectivitycheck.gstatic.com | GOOGLE | US | whitelisted |
— | — | 216.58.206.68:443 | www.google.com | GOOGLE | US | whitelisted |
— | — | 74.125.133.81:443 | staging-remoteprovisioning.sandbox.googleapis.com | GOOGLE | US | whitelisted |
2361 | app_process64 | 142.250.185.99:443 | update.googleapis.com | GOOGLE | US | whitelisted |
2361 | app_process64 | 142.250.185.238:443 | dl.google.com | GOOGLE | US | whitelisted |
2361 | app_process64 | 34.104.35.123:443 | edgedl.me.gvt1.com | GOOGLE | US | whitelisted |
2306 | app_process64 | 142.250.186.99:443 | clientservices.googleapis.com | GOOGLE | US | whitelisted |
2267 | app_process64 | 144.172.93.125:80 | — | QUICKPACKET | US | unknown |
Domain | IP | Reputation |
|---|---|---|
connectivitycheck.gstatic.com |
| whitelisted |
www.google.com |
| whitelisted |
time.android.com |
| whitelisted |
google.com |
| whitelisted |
staging-remoteprovisioning.sandbox.googleapis.com |
| whitelisted |
update.googleapis.com |
| whitelisted |
dl.google.com |
| whitelisted |
edgedl.me.gvt1.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
checkip.amazonaws.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Android Device Connectivity Check |
2267 | app_process64 | Device Retrieving External IP Address Detected | ET INFO External IP Check (checkip .amazonaws .com) |
339 | netd | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (checkip .amazonaws .com) |
2267 | app_process64 | Not Suspicious Traffic | INFO [ANY.RUN] Websocket Upgrade Request |
2267 | app_process64 | Not Suspicious Traffic | INFO [ANY.RUN] Websocket Upgrade Request |
2267 | app_process64 | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request |
2267 | app_process64 | Device Retrieving External IP Address Detected | ET INFO External IP Check (checkip .amazonaws .com) |
2267 | app_process64 | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request |
2267 | app_process64 | Device Retrieving External IP Address Detected | ET INFO External IP Check (checkip .amazonaws .com) |
2267 | app_process64 | Device Retrieving External IP Address Detected | SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request |