Overview
overview
6Static
static
6AdbWinApi.dll
windows7-x64
3AdbWinApi.dll
windows10-2004-x64
3AdbWinUsbApi.dll
windows7-x64
1AdbWinUsbApi.dll
windows10-2004-x64
3KingRoot.exe
windows7-x64
3KingRoot.exe
windows10-2004-x64
3PluginKingRoot.dll
windows7-x64
1PluginKingRoot.dll
windows10-2004-x64
1adb.exe
windows7-x64
1adb.exe
windows10-2004-x64
1block
debian-9-armhf
busybox
debian-9-armhf
1evil.apk
evil.apk
android-10-x64
1evil.apk
android-11-x64
1exynos-abuse
debian-9-armhf
flood
debian-9-armhf
libboy.apk
libboy.apk
android-10-x64
libboy.apk
android-11-x64
libsu.so
debian-9-armhf
libxy.so
debian-9-armhf
1motofail
debian-9-armhf
rageagainstthecage
debian-9-armhf
1root
debian-9-armhf
root.sh
windows7-x64
3root.sh
windows10-2004-x64
3roottool
debian-9-armhf
su
debian-9-armhf
superuser.apk
thinkpwn
debian-9-armhf
xyz
debian-9-armhf
Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:53
Static task
static1
Behavioral task
behavioral1
Sample
AdbWinApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AdbWinApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
AdbWinUsbApi.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
AdbWinUsbApi.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
KingRoot.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
KingRoot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
PluginKingRoot.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
PluginKingRoot.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
adb.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
block
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral12
Sample
busybox
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral13
Sample
evil.apk
Behavioral task
behavioral14
Sample
evil.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral15
Sample
evil.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral16
Sample
exynos-abuse
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral17
Sample
flood
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral18
Sample
libboy.apk
Behavioral task
behavioral19
Sample
libboy.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral20
Sample
libboy.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral21
Sample
libsu.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral22
Sample
libxy.so
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral23
Sample
motofail
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral24
Sample
rageagainstthecage
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral25
Sample
root
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral26
Sample
root.sh
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
root.sh
Resource
win10v2004-20231215-en
Behavioral task
behavioral28
Sample
roottool
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral29
Sample
su
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral30
Sample
superuser.apk
Behavioral task
behavioral31
Sample
thinkpwn
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral32
Sample
xyz
Resource
debian9-armhf-20231215-en
General
-
Target
root.sh
-
Size
20B
-
MD5
e9e8127c8fc08b5bb2de1cfda092033d
-
SHA1
88682ed625b3d45f905098a14ec3867e21ea8beb
-
SHA256
e0f4d86b3a2ee22d7ead0efe7bbe5ead669ba368bd5c9029e3ce01ffadcd2274
-
SHA512
59e2e6a006c68f0ea16ff4bd3f0e800f83090621a4a605e1ddbda19b93fff3d250a1ceda87079c51caecc6a0ecaba22136cf3b3606be42488f180c76117be55b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 404 OpenWith.exe