Analysis
-
max time kernel
115s -
max time network
303s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
12-08-2024 10:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://Ipinfo.io
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
http://Ipinfo.io
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
http://Ipinfo.io
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
http://Ipinfo.io
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
http://Ipinfo.io
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral6
Sample
http://Ipinfo.io
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral7
Sample
http://Ipinfo.io
Resource
ubuntu1804-amd64-20240611-en
General
-
Target
http://Ipinfo.io
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5f53ccc8494ce8c0ad0e1488d91f7824d
SHA168605ab91124649857791c8ba24d8ed8ffa18591
SHA256aa6871c3b3e763bb1d1eff5df581cc819383c0a0ad3edf1462403a4c258445aa
SHA5120588fbb2a8fbc164e06a90f84d8fb39dd99d7e562a9b143382aaa5bf0b9dee7c7fa7b99e8d94b33c5a1cde6269caf5a3da51af1051147c07e102854f4c2917d8