Analysis
-
max time kernel
375s -
max time network
370s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
08-06-2024 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipinfo.io/tags/geodns
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
https://ipinfo.io/tags/geodns
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral5
Sample
https://ipinfo.io/tags/geodns
Resource
macos-20240410-en
General
-
Target
https://ipinfo.io/tags/geodns
Malware Config
Signatures
-
Looks up external IP address via web service 24 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipinfo.io 46 ipinfo.io 55 ipinfo.io 8 ipinfo.io 10 ipinfo.io 22 ipinfo.io 23 ipinfo.io 24 ipinfo.io 25 ipinfo.io 53 ipinfo.io 11 ipinfo.io 26 ipinfo.io 43 ipinfo.io 44 ipinfo.io 48 ipinfo.io 47 ipinfo.io 9 ipinfo.io 12 ipinfo.io 13 ipinfo.io 14 ipinfo.io 15 ipinfo.io 21 ipinfo.io 45 ipinfo.io 54 ipinfo.io -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5a50e849dab1e6cde463a86da6d8a583c
SHA157e5c45f5e13c54a92a01490762f9d056eba3ab9
SHA256677e90ce7e4536d40c8671f9313c6814b36591e7f8df7b32e5a9dfb0a145eeef
SHA51278e92cc72ac67a3091eed420befdb219e013aceb89a3054e4e2613b79ed8a0cc4ff6d9b4ad01bf0e2e569f6e7a9207addeaf0b6b263f6cb2f477d386b4d9d68a