Analysis
-
max time kernel
313s -
max time network
299s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
08-06-2024 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipinfo.io/tags/geodns
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
https://ipinfo.io/tags/geodns
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral5
Sample
https://ipinfo.io/tags/geodns
Resource
macos-20240410-en
General
-
Target
https://ipinfo.io/tags/geodns
Malware Config
Signatures
-
Looks up external IP address via web service 21 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 27 ipinfo.io 54 ipinfo.io 67 ipinfo.io 69 ipinfo.io 16 ipinfo.io 15 ipinfo.io 31 ipinfo.io 32 ipinfo.io 53 ipinfo.io 12 ipinfo.io 14 ipinfo.io 17 ipinfo.io 26 ipinfo.io 39 ipinfo.io 40 ipinfo.io 41 ipinfo.io 68 ipinfo.io 13 ipinfo.io 33 ipinfo.io 52 ipinfo.io 25 ipinfo.io -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD53a5b28b481fa5c88bee9ba534143e6cf
SHA16d171c1330bf9c762e136f5ac5ec04bd3f59c1c2
SHA256c0c8a759d8758ae4508cb1646eca19d8f62947e95796585488558a64d58e0390
SHA5120ec5ba0f3622ef2636c1444a496e1e6fc1ec239376b60a595036c1bf94bfdf6b39ab81d6470b1e7a5952e1bc0ff1ecadd876884eb0a02cc976733de6b934218d