Malware Analysis Report

2025-01-19 07:48

Sample ID 240611-xzhz2sybkj
Target 7up69l.jpg
SHA256 69f43617b38f34ba3a45a9bf75829568078ce6e6b86cb75c2babd2f891810e4e
Tags
score
1/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
1/10

SHA256

69f43617b38f34ba3a45a9bf75829568078ce6e6b86cb75c2babd2f891810e4e

Threat Level: No (potentially) malicious behavior was detected

The file 7up69l.jpg was found to be: No (potentially) malicious behavior was detected.

Malicious Activity Summary

N/A

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 19:17

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 19:17

Reported

2024-06-11 19:17

Platform

android-x86-arm-20240611-en

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-11 19:17

Reported

2024-06-11 19:17

Platform

android-x64-20240611.1-en

Max time network

4s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp

Files

N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-11 19:17

Reported

2024-06-11 19:17

Platform

android-x64-arm64-20240611.1-en

Max time network

6s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
GB 172.217.16.238:443 tcp
N/A 224.0.0.251:5353 udp
GB 172.217.16.238:443 tcp

Files

N/A