PULSE NAME
Fancy Bear Tracking of Ukrainian Field Artillery Units
WHITE Sofacy AlienVault 2016-12-22 Modified: 2017-03-06
2
IOCs
LOW VOLUME
Late in the summer of 2016, CrowdStrike Intelligence analysts began investigating a curious Android Package (APK) named ‘Попр-Д30.apk’ which contained a number of Russian language artifacts that were military in nature. Initial research identified that the filename suggested a relationship to the D-30 122mm towed howitzer, an artillery weapon first manufactured in the Soviet Union in the 1960s but still in use today. In-depth reverse engineering revealed the APK contained an Android variant of X-Agent, the command and control protocol was closely linked to observed Windows variants of X-Agent, and utilized a cryptographic algorithm called RC4 with a very similar 50 byte base key.
Indicators of Compromise (2)
All IPv4 FileHash-MD5
TYPEINDICATORDESCRIPTIONCREATED
IPv4 69.90.132.215 2016-12-22
FileHash-MD5 6f7523d3019fa190499f327211e01fcb 2016-12-22