Analysis

  • max time kernel
    436s
  • max time network
    437s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 11:46

General

  • Target

    EvilRAT.apk

  • Size

    4.7MB

  • MD5

    97f3286dcaecf39951d3b7a0e66d208f

  • SHA1

    2435be5eb810dd2f76757579b8c272511adb59b0

  • SHA256

    9dbe5b1a7dc239f17fb41e399e9137c675b2e4e3882974ef9397cee4d4bd91ff

  • SHA512

    81dfb13099ce13f63efa89d43a557c71e8e7ca0c6aa6bdeb06e4d1d58e08292b83f4d861ab91db4d76f901616511226a2e049f86482f1016201008f81fc40c6c

  • SSDEEP

    98304:G/xXWXStFaLWlUapHhDciMiSm4LqN8VNmzpyzBeTr0tqodTb:QxXWX+FlUUBDNMxmYAzpfUxF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\EvilRAT.apk
    1⤵
    • Modifies registry class
    PID:4964
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads