Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 09:03

General

  • Target

    DroidJack.4.4.Cracked.2.02.2016/DroidJack/DroidJack_lib/httpcore-4.2.4.jar

  • Size

    221KB

  • MD5

    6ccb86231d8a8b99c551b4ddf926ddd1

  • SHA1

    3b7f38df6de5dd8b500e602ae8c2dd5ee446f883

  • SHA256

    bda2b9e0464f7a0e122d5e9bff7b384f3bc3a91af18ad51e029deaaa599e5db3

  • SHA512

    0c4de4513cafb13a81bcad7cc1a4e45759ba32654eafde15665afde63a427b04ac25cfe17e4bbd1887225960b5aaf7e73382e35ec16993dbc1fd19a2bf5e8ab9

  • SSDEEP

    6144:mjj5oIwPj1CM0oifaJtv27fxnNibFx992P0SfMPlJ:mRoZPjuwgRNUIPTW

Score
1/10

Malware Config

Signatures

Processes

  • C:\Windows\system32\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\DroidJack.4.4.Cracked.2.02.2016\DroidJack\DroidJack_lib\httpcore-4.2.4.jar
    1⤵
      PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1704-4-0x0000000002700000-0x0000000002970000-memory.dmp

      Filesize

      2.4MB

    • memory/1704-10-0x0000000000150000-0x0000000000151000-memory.dmp

      Filesize

      4KB

    • memory/1704-11-0x0000000002700000-0x0000000002970000-memory.dmp

      Filesize

      2.4MB