Overview
overview
10Static
static
10The-MALWAR...ot.exe
android-10-x64
The-MALWAR...ll.exe
android-10-x64
The-MALWAR...BS.exe
android-10-x64
The-MALWAR...in.exe
android-10-x64
The-MALWAR....A.exe
android-10-x64
The-MALWAR....A.exe
android-10-x64
The-MALWAR....A.dll
android-10-x64
The-MALWAR...r.xlsm
android-10-x64
The-MALWAR...36c859
android-10-x64
The-MALWAR...caa742
android-10-x64
The-MALWAR...c1a732
android-10-x64
The-MALWAR...57c046
android-10-x64
The-MALWAR...4cde86
android-10-x64
The-MALWAR...460a01
android-10-x64
The-MALWAR...ece0c5
android-10-x64
The-MALWAR...257619
android-10-x64
The-MALWAR...fbcc59
android-10-x64
The-MALWAR...54f69c
android-10-x64
The-MALWAR...d539a6
android-10-x64
The-MALWAR...4996dd
android-10-x64
The-MALWAR...8232d5
android-10-x64
The-MALWAR...66b948
android-10-x64
The-MALWAR...f9db86
android-10-x64
The-MALWAR...ea2485
android-10-x64
The-MALWAR...us.exe
android-10-x64
The-MALWAR....a.exe
android-10-x64
The-MALWAR....a.exe
android-10-x64
The-MALWAR...ok.exe
android-10-x64
The-MALWAR...y.html
android-10-x64
1The-MALWAR...ft.exe
android-10-x64
The-MALWAR...en.exe
android-10-x64
The-MALWAR...min.js
android-10-x64
Analysis
-
max time kernel
119s -
max time network
155s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
30-04-2024 13:03
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
android-x64-20240910-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
android-x64-20240910-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
android-x64-20240624-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
android-x64-20240910-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
android-x64-20240910-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
android-x64-20240624-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
android-x64-20240910-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
android-x64-20240910-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
android-x64-20240624-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
android-x64-20240910-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
android-x64-20240910-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
android-x64-20240910-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
android-x64-20240910-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
android-x64-20240624-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
android-x64-20240910-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
android-x64-20240910-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
android-x64-20240624-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
android-x64-20240624-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
android-x64-20240910-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
android-x64-20240910-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Email-Worm/Emin.js
Resource
android-x64-20240624-en
General
-
Target
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
-
Size
12KB
-
MD5
bb7b91d1685db89b58ac01a72921e632
-
SHA1
4a1dd457983a7f1bbc7943eb5fca3da6d93d4176
-
SHA256
940a563df059604ac0dc6a92a845da2f04236b86887208b89969b70c6781c3f8
-
SHA512
09e26d197b22a4553e2e87a9ee0957700766c2dcd11157b5b71744d67abfa30d71d45c7bf1081bf9337527e3b8aabde99b09bd2bd30aa302329ebf480078307e
-
SSDEEP
192:W1VoVk8X2TrWAXaR06qVoVk8X2TrWAXaR06LV:Giui2TSw6qiui2TSw6LV
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5a02c44ceb7ef635fda73101b4dabcda2
SHA182365cfab6f924bb52d63a5a656a42d971600127
SHA256a243189b43a0d63eaedead4b6be4c24d0de46e96af723c01a9a3b87c2261cfa3
SHA51211560ceee9a25e1ceb131815fca1c60352befe0652d51621d5f8528910f74bb387530ae1dd556201e0b57241cbf011bf4465d20594df2a637d6cb545415a999a