Malware Analysis Report

2025-01-19 07:51

Sample ID 240608-wv851afa68
Target 3pzcq5sdnah7
SHA256 f6b4913fb34c03a0c43a421b4ef74a1b628e03db9b0bdc9400ed85ae6f528cf9
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

f6b4913fb34c03a0c43a421b4ef74a1b628e03db9b0bdc9400ed85ae6f528cf9

Threat Level: No (potentially) malicious behavior was detected

The file 3pzcq5sdnah7 was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary


Checks CPU information

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-08 18:15

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 18:15

Reported

2024-06-08 18:45

Platform

android-x86-arm-20240603-en

Max time kernel

375s

Max time network

1227s

Command Line

com.android.chrome

Signatures

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.android.chrome

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 update.googleapis.com udp
GB 142.250.200.35:443 update.googleapis.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 216.58.204.74:443 tcp
GB 142.250.200.3:80 tcp
GB 172.217.16.228:443 tcp
GB 142.250.187.226:443 tcp
US 1.1.1.1:53 update.googleapis.com udp
GB 142.250.187.195:443 update.googleapis.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
US 1.1.1.1:53 android.apis.google.com udp

Files

N/A