Analysis
-
max time kernel
57s -
max time network
66s -
platform
android_x64 -
resource
android-33-x64-arm64-20240624-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240624-enlocale:en-usos:android-13-x64system -
submitted
22-11-2024 11:33
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://rastreos-interrapidisimo.com
Resource
android-33-x64-arm64-20240624-en
android-13-x64
5 signatures
60 seconds
General
-
Target
http://rastreos-interrapidisimo.com
Score
7/10
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 64 api.ipify.org -
Checks CPU information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
Processes:
com.android.chromedescription ioc Process File opened for read /proc/meminfo com.android.chrome