Analysis
-
max time kernel
314s -
max time network
292s -
platform
android_x64 -
resource
android-x64-arm64-20240603-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240603-enlocale:en-usos:android-11-x64system -
submitted
08-06-2024 22:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ipinfo.io/tags/geodns
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
https://ipinfo.io/tags/geodns
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral3
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-20240603-en
Behavioral task
behavioral4
Sample
https://ipinfo.io/tags/geodns
Resource
android-x64-arm64-20240603-en
Behavioral task
behavioral5
Sample
https://ipinfo.io/tags/geodns
Resource
macos-20240410-en
General
-
Target
https://ipinfo.io/tags/geodns
Malware Config
Signatures
-
Looks up external IP address via web service 22 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 59 ipinfo.io 74 ipinfo.io 75 ipinfo.io 90 ipinfo.io 36 ipinfo.io 58 ipinfo.io 24 ipinfo.io 28 ipinfo.io 37 ipinfo.io 73 ipinfo.io 76 ipinfo.io 85 ipinfo.io 15 ipinfo.io 21 ipinfo.io 29 ipinfo.io 86 ipinfo.io 88 ipinfo.io 14 ipinfo.io 20 ipinfo.io 91 ipinfo.io 25 ipinfo.io 87 ipinfo.io -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5e97aeb5c06862645b2d62d3770e26ea7
SHA1c17c05de8e0bfbd224b3e60860a8e59ad7d686fe
SHA2569c346fc41223efabd94eecbd5c692372fc3ae7cb2f2cb99fc87bff13bccc04ef
SHA5126c3b10ae946c23241fffcc167c59a4d75579dff7f00d47194b885e10d781a3678782e913bd27193b8fb70ecb113a59fcc9b9bafe1080209dc95a8fed43f76e51