Analysis
-
max time kernel
149s -
max time network
157s -
platform
android_x64 -
resource
android-33-x64-arm64-20240508.1-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240508.1-enlocale:en-usos:android-13-x64system -
submitted
10/05/2024, 17:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.com
Resource
win11-20240426-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
http://discord.com
Resource
android-33-x64-arm64-20240508.1-en
4 signatures
150 seconds
General
-
Target
http://discord.com
Score
7/10
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.android.chrome -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 17 discord.com 20 discord.com
Processes
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5276a287d7cd9873c8d799d9eae6e5207
SHA15635a613e7ee33cfcf6b2affbc5ec9ad38032b65
SHA256eb861f749ea602784ed57a63e98a86c61f2410427154e6e4e9bbcd852f3120cb
SHA512749929b7c0def00baaec44ef99a5cf043547e2ee2ac6aca8568de3cd8012e65d1360160f3cd11db0042f2cc2b4fc8931dad59d88a9c61192779c0ae61289e54a