Analysis
-
max time kernel
116s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240221-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240221-enlocale:en-usos:android-10-x64system -
submitted
28/04/2024, 04:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/evilthreads669966/EvilScreen/releases/download/1.0.1/evilscreen.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
https://github.com/evilthreads669966/EvilScreen/releases/download/1.0.1/evilscreen.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
https://github.com/evilthreads669966/EvilScreen/releases/download/1.0.1/evilscreen.apk
Resource
android-x64-arm64-20240221-en
General
-
Target
https://github.com/evilthreads669966/EvilScreen/releases/download/1.0.1/evilscreen.apk
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56fdf6a134d9f7c6b3dade1fa8ee039d5
SHA1aa9ad1a9d077010868214f996e2c6c4282f0fe8d
SHA25672341f43ec3c64d09b30a8b98366b361f37cf6b67ce76c037c02dbe1dc018eeb
SHA512dfcb611707d8dd575d635c4c94e313863781d4baba71399483b7e443570cf7184800201220ccc056660fa38dff22e4d0fef48aeba0269ac2e43ae3fe2252ec4f