Analysis
-
max time kernel
548s -
max time network
605s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
18-04-2024 18:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1rdP_Ff-NFRtELN554qVgssYc5QSDAa64/view
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
https://drive.google.com/file/d/1rdP_Ff-NFRtELN554qVgssYc5QSDAa64/view
Resource
android-x64-20240221-en
General
-
Target
https://drive.google.com/file/d/1rdP_Ff-NFRtELN554qVgssYc5QSDAa64/view
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process URI accessed for read content://media/external/images/media com.android.chrome -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
files/dom-0.htmlFilesize
114KB
MD5ed8e3a3e6ee980de3c682f848dd00420
SHA121f2c3bec8c0732e2726f5fe4b9dfa00935488cc
SHA25681a709a81a1c5263398935a9360d94769411271885aa7c1f4a45d49da1634a5e
SHA5123b8c896a75a108cfc71e7f3debd24069137c4388f44261e515738f81ae50f0cf3dd58742d81b20f3dd57e85b871129df3d630c80161084e05cb8e844dda05792