Analysis
-
max time kernel
149s -
max time network
154s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
submitted
20/02/2025, 02:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
macos-20241101-en
General
-
Target
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5b898541b3eebbe9c6458fd54cd5dc5f1
SHA1b1643c34fec902e2d943100b9985d0469cbcf37d
SHA256cc90f2f77df5a2e1396e9fb6f82823d97e96d74f097a25c7bb919c3016c2e31f
SHA5128b5986a9c82ac18d10aff17106b4f90d332b42ecea40284aa6baf51c0034dc4dea01f1134e68e5200db3785ecd189a8d2387d67786c8b4907fbb44f1adb2d288