Analysis
-
max time kernel
124s -
max time network
132s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
04-07-2024 12:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cl.gy/ZTtsa
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
https://cl.gy/ZTtsa
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://cl.gy/ZTtsa
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://cl.gy/ZTtsa
Resource
android-x64-arm64-20240624-en
General
-
Target
https://cl.gy/ZTtsa
Malware Config
Signatures
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 41 api.ipify.org 42 api.ipify.org -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
files/dom-0.htmlFilesize
6KB
MD536b30bf5390ed68995636228721e7178
SHA1c0eb2def2938629413cbecfde9a6ff5e98ce3617
SHA2567d7f1921309791bc183f4ca1fff4dafe625b85dd840a45bec4ebc2b8e95bc02c
SHA51257ace35b6127cb1c77e2f9673e8301f3d7fa5b3c9e03acaa9dcedc66604f14171e8c0f96b4a9fd0432f0dee8fcbe4c01fd3b7aef3759e32f5d04687048fc4918