Analysis
-
max time kernel
142s -
max time network
154s -
platform
android_x64 -
resource
android-x64-arm64-20240506-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240506-enlocale:en-usos:android-11-x64system -
submitted
07/05/2024, 11:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://raw.githubusercontent.com/yuankong666/Ultimate-RAT-Collection/main/README.md
Resource
android-x64-arm64-20240506-en
4 signatures
150 seconds
General
-
Target
https://raw.githubusercontent.com/yuankong666/Ultimate-RAT-Collection/main/README.md
Score
7/10
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.android.chrome -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 5 raw.githubusercontent.com 8 raw.githubusercontent.com 9 raw.githubusercontent.com 12 raw.githubusercontent.com 15 raw.githubusercontent.com
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5774d459bb822066ca7a11aeaa79d3fd7
SHA118be9151bcd563a6fb27099a3326d0f46aba9c47
SHA2566fb2ab017e37ba0a3bdb007dc4c04848d08946cfa0fc5f520f47a17c38e17b9c
SHA5129ba06fdb7761a8afc7a071b95ae95fec6b3ef1bc371e0eedb4ebf04be0bb3b7998ca9fdcca4768cfa25674b434c33f694bd72077cf6a72b4ce43dec96ca4b039