Analysis
-
max time kernel
1821s -
max time network
1818s -
platform
android_x64 -
resource
android-x64-arm64-20240624-ja -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-jalocale:ja-jpos:android-11-x64system -
submitted
07-08-2024 01:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1EAoMkEYdm4_FStzHBNRA_g05ih_W8UDm
Resource
android-x64-arm64-20240624-ja
Behavioral task
behavioral2
Sample
https://drive.google.com/drive/folders/1EAoMkEYdm4_FStzHBNRA_g05ih_W8UDm
Resource
macos-20240711.1-ja
Behavioral task
behavioral3
Sample
https://drive.google.com/drive/folders/1EAoMkEYdm4_FStzHBNRA_g05ih_W8UDm
Resource
macos-20240711.1-ja
General
-
Target
https://drive.google.com/drive/folders/1EAoMkEYdm4_FStzHBNRA_g05ih_W8UDm
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 19 drive.google.com 23 drive.google.com 25 drive.google.com 65 drive.google.com 66 drive.google.com 98 drive.google.com 99 drive.google.com -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5d4574abf160fc350b81f63b656ff3dee
SHA1c7e51e7db66ecbd1ad81623737e7a5ca1c2326f9
SHA2564825b4211994777976358da44de5b94731c7f5da4490bbbc26e5d373ec3e3f2b
SHA5121e88587dc1a16101fca7e8982f22d09a755335a370bf9c8371ef3dd15d51a92bb3ba7312c0aeee99bbae2009a453f00e32ca33aa1ad216a3d82532d055bcf819