Analysis
-
max time kernel
375s -
max time network
1221s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
18/05/2024, 17:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://tiktok.com
Resource
android-x86-arm-20240514-en
2 signatures
1200 seconds
Behavioral task
behavioral2
Sample
http://tiktok.com
Resource
android-x64-20240514-en
3 signatures
1200 seconds
General
-
Target
http://tiktok.com
Score
7/10
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD508263fd373b50d36bfcde454adb28611
SHA1a8a002a8b4052be57591cb494a6a4837eb67508e
SHA2562f5cc0888fded57b8c6262534fe1d020064c1c465ae30c3fa5a6e31902485ade
SHA5122a233917d054f3c02a61d5a899302fcb5692f14ac583ed8f9ca0913c0ceee0e35a84ff7d2230f686c365be73ecfdc83ffaff9d0e783fd2d8824f0e6c6108faf2