Analysis
-
max time kernel
172s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21/05/2024, 21:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1232837563535065098/1242590901142945933/Logged_v1.6.0.exe?ex=664e6475&is=664d12f5&hm=6599e1c43aa014e0665117b2255c9eb2fb9c13e986f6877fe7fdd47f4b16a6a4&
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1232837563535065098/1242590901142945933/Logged_v1.6.0.exe?ex=664e6475&is=664d12f5&hm=6599e1c43aa014e0665117b2255c9eb2fb9c13e986f6877fe7fdd47f4b16a6a4&
Resource
android-x64-arm64-20240514-en
General
-
Target
https://cdn.discordapp.com/attachments/1232837563535065098/1242590901142945933/Logged_v1.6.0.exe?ex=664e6475&is=664d12f5&hm=6599e1c43aa014e0665117b2255c9eb2fb9c13e986f6877fe7fdd47f4b16a6a4&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo com.android.chrome -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/fstream-3.dat pyinstaller
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5cecb649cb1fb79c3736936fcbef3bbf2
SHA12c95183d7d2b0cd68d15b3c4115189351fc08720
SHA25609bda72e7c32a69e3268e0ebd8caa33684cbc954dd00c7d93a38830e348ef324
SHA512b8aca3cf0ea838093bd29b70ead608597260b0e35886d491d17c304878f99510fd885d96a191080acb5b706a642253bd9cbe5065ff234472b048fcce282061de
-
Filesize
74.2MB
MD5e17d47876d6c3f7313a8c7a830733d18
SHA1b4df682a47947328421af8f64bed1367d44b28e3
SHA2561e835806ad4af3c933a0acfe497bc84fa15c95cbfc78681a5a4a71495c0b6d39
SHA5122d4bfdda309752bf6e65f34a2f38345ed83c0ee70d8587d58e059d9adbd8f56030928a8c75a88f4df16cf0c855062c650d975bd97db89ab7dcdc6797d7e08070
-
Filesize
12.2MB
MD5c7485cef3f7d1556c588b731bccbd647
SHA1c14bb283a824f93ffa3b86e94fc2749bb5f49a14
SHA2561ecf5a9e9159e951ca0dd05f84c6dcbcb0a255521ce727e22fdacf46acc2fab2
SHA512eb68844476d3ebcf42dd6d67b5397fec679a9697848152871422e5fb90b4d058d6634cb4b61968f6d356bce17b204f495933a485cbb312d81af4ba21b9b58089