Analysis
-
max time kernel
262s -
max time network
296s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
10-12-2024 15:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://interrapidisimo-co.com
Resource
android-x64-arm64-20240624-en
6 signatures
300 seconds
Behavioral task
behavioral2
Sample
http://interrapidisimo-co.com
Resource
android-33-x64-arm64-20240624-en
2 signatures
300 seconds
General
-
Target
http://interrapidisimo-co.com
Score
7/10
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
A potential corporate email address has been identified in the URL: [email protected]
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 api.ipify.org 69 api.ipify.org -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD5b941c6dcfcd21a1942af41c2e7819694
SHA1e1216ebf8ed598425196f20cc202915a72a260af
SHA256ebe62d839ec25168d8894f678e3cc5f3ddbfe7c04f22a6ebf812ef0043b00b85
SHA5127ecb2c7d6698eaad9562ab8eca464239f2c8332aa1447ac499865aa08ddd5cb38930a91363b0ddef4d4e13447dc73793b8894bfe60d1d962d34d293bc96b89ea