Analysis
-
max time kernel
313s -
max time network
327s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
23-05-2024 00:58
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://virginiadileoni.com.ar/zxsdfg/Redirect/htdocs
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://virginiadileoni.com.ar/zxsdfg/Redirect/htdocs
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
https://virginiadileoni.com.ar/zxsdfg/Redirect/htdocs
Resource
android-x64-20240514-en
General
-
Target
https://virginiadileoni.com.ar/zxsdfg/Redirect/htdocs
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
730B
MD5122446ff86c2d802963f1c3d7378f7b9
SHA1cacc3aa8ee49bb8c4f3e1fc5cbdf6695c95d9c97
SHA256662e5e8e20a5b91a18c96af2ba4f1e87eaab1046f004f895b412b3a888154188
SHA51298bd7398c4ea3fdf29cf0db9eda65cdde1a10d5abd7582f592f38820c5d6e84adf8e75dd25bbbe126ea3e58aac817164e5ff534a245d2aac17b20ed48648f0a3