Resubmissions

17-12-2023 09:23

231217-lcwf3sfee4 1

24-08-2023 10:29

230824-mjle5abg93 8

24-08-2023 10:11

230824-l8dwxadb9s 7

24-08-2023 10:08

230824-l6nnbsbg33 1

23-08-2023 12:45

230823-py9sdacc24 8

23-08-2023 11:00

230823-m38prsda7y 1

23-08-2023 10:49

230823-mw51asbe95 5

23-08-2023 10:04

230823-l4fvpsbd49 1

23-08-2023 10:04

230823-l39rdscg9s 1

Analysis

  • max time kernel
    654874s
  • max time network
    73s
  • platform
    android_x86
  • resource
    android-x86-arm-20230621-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20230621-enlocale:en-usos:android-9-x86system
  • submitted
    24-08-2023 10:11

General

  • Target

    https://google.com

Score
7/10

Malware Config

Signatures

  • Requests cell location 1 IoCs

    Uses Android APIs to to get current cell information.

  • Removes a system notification. 1 IoCs

Processes

  • com.android.chrome
    1⤵
    • Requests cell location
    • Removes a system notification.
    PID:3891

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /storage/emulated/0/Download/.com.google.Chrome.vviAMN

    Filesize

    5.8MB

    MD5

    ad95c813de0a3cabe21723d6eee01451

    SHA1

    680529ce8335031841440fd5d98ed50484bc2d53

    SHA256

    6298d8dc6ff30936004d7ccdf2405978512730aacdf0b3dcfd1eb34b50798fab

    SHA512

    2f1370ff4bdd410cd8e1ef1fd3b3c9ed4cc1eb0cadcfbc5854ce4b44d1ee0023e7857a885fd26b2eaa0f03ca3e8105a2052ce21440afcdce4bd59fe8664fb07a

  • /storage/emulated/0/Download/Unconfirmed 142345.crdownload

    Filesize

    7.7MB

    MD5

    969f5ff994d354c857112c3969f6e754

    SHA1

    21323165fc33f7487c3454c37e91937b508ea204

    SHA256

    272338a27dd94aa346f2dd949988ff06a99e984265de098970bdd17475eae28e

    SHA512

    9d28f23a0a1a5cc0ed77a00c3a5fe5a56af5132a7556e8699eb8f903f46dc8398683bf6e9b9f4e10e1f652dbedba08ed0cf3726f164d540f89a0a190b1a7bd65