Analysis
-
max time kernel
3880722s -
max time network
146s -
platform
android_x64 -
resource
android-x64-arm64 -
submitted
03-11-2021 19:35
Static task
static1
URLScan task
urlscan1
Sample
https://физтеронес.я.рус/volansione1/
Behavioral task
behavioral1
Sample
https://физтеронес.я.рус/volansione1/
Resource
android-x64-arm64
General
-
Target
https://физтеронес.я.рус/volansione1/
Malware Config
Signatures
-
Checks Android system properties for emulator presence. 1 IoCs
Processes:
com.android.chromedescription ioc process Accessed system property key: ro.product.model com.android.chrome -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.android.chromeioc pid process /data/user/0/com.android.chrome/app_dex/webapk7.dex 4098 com.android.chrome /data/user/0/com.android.chrome/app_dex/webapk7.dex 4098 com.android.chrome
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.android.chrome/app_dex/webapk7.dexMD5
711308589b991c1e2d7e18e823a12936
SHA117a79b0c3a86147930e6ca88fd3fe5737a1f2cbb
SHA256189e4d1258fe370ed7346728fdad910a54929532c324d2e2b70fbd1b86526214
SHA5122e4fb6326dd7762603afe285368f164b4819ff37ea5487fc65123a8644c74332213c67d903d1dc7a5699c8ea9b1ac993b58ee7b29a5a681639ba292737af60ec
-
/data/user/0/com.android.chrome/app_dex/webapk7.dexMD5
711308589b991c1e2d7e18e823a12936
SHA117a79b0c3a86147930e6ca88fd3fe5737a1f2cbb
SHA256189e4d1258fe370ed7346728fdad910a54929532c324d2e2b70fbd1b86526214
SHA5122e4fb6326dd7762603afe285368f164b4819ff37ea5487fc65123a8644c74332213c67d903d1dc7a5699c8ea9b1ac993b58ee7b29a5a681639ba292737af60ec
-
files/dom-0.html