Overview
overview
7Static
static
1URLScan
urlscan
1http://api.ipify.org
android-10-x64
7http://api.ipify.org
android-11-x64
7http://api.ipify.org
android-9-x86
7http://api.ipify.org
debian-9-armhf
http://api.ipify.org
debian-9-mips
http://api.ipify.org
debian-9-mipsel
http://api.ipify.org
ubuntu-18.04-amd64
3Analysis
-
max time kernel
168s -
max time network
187s -
platform
android_x64 -
resource
android-x64-arm64-20240514-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240514-enlocale:en-usos:android-11-x64system -
submitted
21-05-2024 14:59
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://api.ipify.org
Resource
android-x64-20240514-en
Behavioral task
behavioral2
Sample
http://api.ipify.org
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral3
Sample
http://api.ipify.org
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral4
Sample
http://api.ipify.org
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral5
Sample
http://api.ipify.org
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral6
Sample
http://api.ipify.org
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral7
Sample
http://api.ipify.org
Resource
ubuntu1804-amd64-20240508-en
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.ipify.org 66 api.ipify.org 14 api.ipify.org
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135B
MD5addeca30f655ab779e1ddeeff32cd15a
SHA12ec2a63bb820d43d7e87da9570554a51e32fff5d
SHA2568f58bd02d779c6fbeb00d58c278f6c5830e49bf0b823a1fa75d42af75a23296d
SHA512b64d0879fde6469fb573dac1c6286127f483e3ca60ba2a604dea6ad37758971cbaccccb80a08c397ea1477008881d53b69a0742458ecddd2eb8b35545b98e698