Malware Analysis Report

2024-10-16 05:07

Sample ID 240922-tmsryayanb
Target https://dosya.co/nt8hcc7eenad/virus.apk.html
Tags
sandrorat infostealer rat trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://dosya.co/nt8hcc7eenad/virus.apk.html was found to be: Known bad.

Malicious Activity Summary

sandrorat infostealer rat trojan

SandroRat

Checks CPU information

Checks memory information

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-22 16:10

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-22 16:10

Reported

2024-09-22 16:31

Platform

android-33-x64-arm64-20240910-en

Max time kernel

80s

Max time network

1159s

Command Line

com.android.chrome

Signatures

SandroRat

trojan infostealer rat sandrorat

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.android.chrome

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 34.104.35.123:80 tcp
GB 172.217.16.227:443 tcp
GB 172.217.169.42:443 tcp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
US 1.1.1.1:53 dosya.co udp
DE 195.201.111.49:443 dosya.co tcp
DE 195.201.111.49:443 dosya.co tcp
US 1.1.1.1:53 gmscompliance-pa.googleapis.com udp
US 1.1.1.1:53 accounts.google.com udp
US 1.1.1.1:53 www.google.com udp
BE 74.125.133.84:443 accounts.google.com tcp
BE 74.125.133.84:443 accounts.google.com tcp
GB 142.250.178.4:443 www.google.com tcp
US 1.1.1.1:53 maxcdn.bootstrapcdn.com udp
US 1.1.1.1:53 cdnjs.cloudflare.com udp
DE 195.201.111.49:443 dosya.co tcp
DE 195.201.111.49:443 dosya.co tcp
DE 195.201.111.49:443 dosya.co tcp
US 104.18.10.207:443 maxcdn.bootstrapcdn.com tcp
US 104.17.25.14:443 cdnjs.cloudflare.com tcp
US 1.1.1.1:53 cdn.jsdelivr.net udp
US 1.1.1.1:53 apis.google.com udp
US 1.1.1.1:53 ps.fungidcolder.com udp
US 104.18.186.31:443 cdn.jsdelivr.net tcp
US 1.1.1.1:53 connect.facebook.net udp
GB 142.250.178.14:443 apis.google.com tcp
GB 163.70.147.23:443 connect.facebook.net tcp
NL 23.109.170.241:443 ps.fungidcolder.com tcp
GB 163.70.147.23:443 connect.facebook.net udp
NL 23.109.170.241:443 ps.fungidcolder.com tcp
US 1.1.1.1:53 region1.analytics.google.com udp
US 1.1.1.1:53 stats.g.doubleclick.net udp
US 1.1.1.1:53 www.google.co.uk udp
US 1.1.1.1:53 region1.analytics.google.com udp
US 1.1.1.1:53 stats.g.doubleclick.net udp
US 1.1.1.1:53 www.google.co.uk udp
GB 142.250.200.3:443 www.google.co.uk tcp
US 216.239.32.36:443 region1.analytics.google.com tcp
US 1.1.1.1:53 www.facebook.com udp
GB 157.240.214.35:443 www.facebook.com tcp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 chrome.cloudflare-dns.com udp
US 1.1.1.1:53 stats.g.doubleclick.net udp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
BE 74.125.206.155:443 stats.g.doubleclick.net tcp
US 162.159.61.3:443 chrome.cloudflare-dns.com tcp
US 162.159.61.3:443 chrome.cloudflare-dns.com tcp
US 1.1.1.1:53 update.googleapis.com udp
BE 74.125.206.155:443 stats.g.doubleclick.net tcp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
US 162.159.61.3:443 chrome.cloudflare-dns.com tcp
US 172.64.41.3:443 chrome.cloudflare-dns.com tcp
US 1.1.1.1:53 remoteprovisioning.googleapis.com udp
GB 142.250.187.202:443 remoteprovisioning.googleapis.com tcp
US 162.159.61.3:443 chrome.cloudflare-dns.com udp
DE 195.201.111.49:443 dosya.co tcp
DE 116.202.229.248:443 tcp
DE 116.202.229.248:443 server72.dosya.co tcp
GB 216.58.204.67:443 update.googleapis.com tcp
US 1.1.1.1:53 rcs-acs-tmo-us.jibe.google.com udp
US 216.239.36.155:443 rcs-acs-tmo-us.jibe.google.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com udp
DE 195.201.111.49:443 dosya.co tcp
GB 172.217.16.228:443 udp
US 1.1.1.1:53 potar.duckdns.org udp
US 192.169.69.25:1628 potar.duckdns.org tcp
US 216.239.32.36:443 region1.analytics.google.com udp
US 192.169.69.25:1628 potar.duckdns.org udp
GB 172.217.16.238:443 android.apis.google.com udp
US 192.169.69.25:1628 potar.duckdns.org tcp
GB 142.250.180.3:443 udp
US 172.64.41.3:443 chrome.cloudflare-dns.com udp
GB 216.58.212.195:443 update.googleapis.com tcp
GB 216.58.212.195:443 udp
GB 172.217.16.228:443 udp
GB 172.217.16.228:443 tcp
GB 172.217.16.228:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.180.4:443 www.google.com udp
US 1.1.1.1:53 www.google.com udp
GB 216.58.212.228:443 www.google.com tcp
GB 142.250.187.198:80 tcp
GB 216.58.213.2:443 tcp
GB 216.58.213.2:443 tcp
GB 142.250.187.198:443 tcp
GB 142.250.187.226:443 tcp
GB 216.58.213.2:443 tcp
GB 216.58.201.97:443 tcp
GB 172.217.169.33:443 tcp
GB 172.217.169.33:443 tcp
GB 172.217.169.33:443 tcp
GB 172.217.169.33:443 tcp
GB 172.217.169.33:443 tcp
US 216.239.36.155:443 rcs-acs-tmo-us.jibe.google.com tcp
US 1.1.1.1:53 gmscompliance-pa.googleapis.com udp
US 1.1.1.1:53 www.google.com udp
GB 216.58.204.68:443 www.google.com udp
GB 142.250.187.202:443 gmscompliance-pa.googleapis.com tcp
GB 142.250.179.238:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.36:443 www.google.com udp

Files

/storage/emulated/0/Download/.pending-1727626273-virus.apk (deleted)

MD5 6eef3f6894b75f2ace507ac82b551519
SHA1 035751df62a1d67717ef79fcf58b00056f811ae7
SHA256 4889161908c435ead199b5858d465e83d3dca4119d7d0af9e4050702ae366339
SHA512 8ee6b2d6901e13a37e59508201e32317e378bd2470bd9900c677f29834e31283b7736d8fa9248969eddc3714e7e6a1a7757baa9602680036c99cf809f5e983d9

/storage/emulated/0/Download/.pending-1727626273-virus.apk

MD5 063ba05f9f2afa3f23b47dc318a7cc24
SHA1 ea09d0c0023e8dc251505a61e3192a7e9c4e180e
SHA256 74c9186a28afc24ae83e4e2d63f6230f219c721dee2a389e32fbe53c2c17d6b0
SHA512 0ac877f41be838f216448f2fdbd483b109c3b93412c73642bb5817f624c301686814e98fb8fc48b4671b3d7a5df8b0e8c2398eef556119c7576cfab4f8b8dce4

files/dom-0.html

MD5 d64e7d2f2c7d8dee3d140983a5657eaa
SHA1 d037ae5bc0a2986a3621d6a7c22f675a83e9e476
SHA256 3cb4ef95b50fd96f8578e17d5eb73b880e41eb0bd8f7a09ab53391bdc05fc949
SHA512 21e88e855bb5a2e64baecc147a3980fb973b085ee62041ba0a3d3264b6aee1e3a7b7f04f1f1a8371b893c6b2b158aeb78e9b4607e52725d082ce1836d6b0ff46