Analysis
-
max time kernel
139s -
max time network
147s -
platform
android_x64 -
resource
android-33-x64-arm64-20240514-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240514-enlocale:en-usos:android-13-x64system -
submitted
17/05/2024, 16:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://klienci-indywidualne-santander-pl.hulum.et
Resource
android-33-x64-arm64-20240514-en
3 signatures
150 seconds
General
-
Target
http://klienci-indywidualne-santander-pl.hulum.et
Score
7/10
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de40a69f7ba5628dfcfd255045849730
SHA1f9b2dccf605e5f0605fced26459b5f9fe32ed2c6
SHA25620f939ca778fd3903f244f961071c8546a8d965c1b747fd023f989504c878753
SHA5125dd5740abe1a9c94c7fcc6feec166410017b7bfe7f529617bc2fbb3e7588dc93ece9d1b83e1c69c2fe503e0c9c187c27ac826b5072a444b5493fe0d8f49e97a3