# BlackRoseLucy

### 01. Introduction

> BlackRoseLucy is an Android trojan found in the wild. The malware is known to collect data from infected phones and turns them to a remote controlled bots. You have to find out the address of the Command & Control (CC) server controlling the bots and you will find out more about the name of the malware. The address is "hard coded".

Requirements

* Download the APK (Android Package).
* Decompile the apk (jadx).
* Analyze the java code

Your goal is to find the CC server address (Protocol,IP, Port) in the decompiled code.

**APK File**:

{% embed url="<https://www.dropbox.com/s/hs28j1zpdddtict/BlackRoseLucy.zip?dl=0>" %}

### 02. Analysis

Like in the last few exercises I'll check the permissions first:

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2Fe25bulYZbGWjsytD7GWa%2FBlackRoseLucy01.png?alt=media\&token=aeff6334-eaf7-41cd-b230-c2b9bbd1bff8)

Next I'll decompile the package by using jadx-gui.&#x20;

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FyyKdApwOwbx6RjTsavI0%2FBlackRoseLucy02.png?alt=media&#x26;token=9f122822-041f-4a01-bb35-618e2745d414" alt=""></div>

This time I couldn't find any strings that points to an URL.  I try to use the search function and search for the term "http\://" and "https\://" inside the code:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FqOPc78HmJ7bxQkndBkMb%2FBlackRoseLucy03.png?alt=media&#x26;token=965c90d7-907a-46bc-aceb-3c2ac9915961" alt=""></div>

I get two results that looks interessting for me:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2F2zSSDQO4607QYe8vx4yO%2FBlackRoseLucy04.png?alt=media&#x26;token=68e6be4d-bde7-4189-a9f0-e50f4e402d18" alt=""></div>

![](https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FXBc2AL8n17GDbGEALBHB%2FBlackRoseLucy05.png?alt=media\&token=20d65eea-e3fc-4424-85d8-230e7c6ab0de)

&#x20;I’ll upload the apk file to virus total and get this graph:

<div align="left"><img src="https://3977837039-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MfT0VPyK6X13Egd9pzy%2Fuploads%2FKo7zuROhfzc8dV5LzCdP%2Fcc_server03.png?alt=media&#x26;token=aad9e416-3fd6-4f0b-abd5-c746d442cfcb" alt=""></div>

Possible CC Server:

thelucy.top

Port: 443


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://cas-cyber.gitbook.io/cas-cybersecurity/android-malware/blackroselucy.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
