Analysis
-
max time kernel
313s -
max time network
302s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
24-05-2024 14:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.hybrid-analysis.com/feed?json
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
https://www.hybrid-analysis.com/feed?json
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
https://www.hybrid-analysis.com/feed?json
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
https://www.hybrid-analysis.com/feed?json
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
https://www.hybrid-analysis.com/feed?json
Resource
macos-20240410-en
General
-
Target
https://www.hybrid-analysis.com/feed?json
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5c60de4a925923514988ec4fad69598d8
SHA12bb4cbb43a7ca1165e83206bb82fff644d5cfce2
SHA2561b8d7a23730ba5e9d0477af5332277c36a04cc5e2daddca70deeccfd9a4f0f3a
SHA512d20513563dc355f9b3140a88172e7fc58e828ca256c35f81943240853e16dccdc797445a09832b873db2630b9e17c33b540f6b9982334f9407f00dc98467041a