Analysis
-
max time kernel
320s -
max time network
315s -
platform
android_x64 -
resource
android-x64-20240514-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240514-enlocale:en-usos:android-10-x64system -
submitted
24-05-2024 17:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://growthenergy.org/member/element-llc/
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
https://growthenergy.org/member/element-llc/
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral3
Sample
https://growthenergy.org/member/element-llc/
Resource
android-x64-20240514-en
Behavioral task
behavioral4
Sample
https://growthenergy.org/member/element-llc/
Resource
android-x64-arm64-20240514-en
Behavioral task
behavioral5
Sample
https://growthenergy.org/member/element-llc/
Resource
macos-20240410-en
General
-
Target
https://growthenergy.org/member/element-llc/
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome -
Reads the content of photos stored on the user's device. 1 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process URI accessed for read content://media/external/images/media com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5f2c1bc58b0fc8194dbe7a166a450abb0
SHA16bfedd414ba98a2877dae750c04bf1633effb1e8
SHA256b5627303dcd58b0a764b8e86e4578d0b1fa8522d11031a4279cccccb48f636e4
SHA512317709b6dd2c379bf5bc96ec2ba305271459913d0db16222019d6c50c30661bd675e373bee9ed3500dc067a36fe26ecc09761f29bd5e3a34210e78bdccbadb36