Analysis
-
max time kernel
147s -
max time network
156s -
platform
android_x64 -
resource
android-x64-20240624-en -
submitted
20/02/2025, 02:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
macos-20241101-en
General
-
Target
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD53ba570e6a5074c194d2a909c9102fdaf
SHA12e5b9a62bb3c8b7993641f09c0f8d3b0c017f0db
SHA256650bef2ba9f532baddd357cb094635b3f68f5345a765f878ce70857f063e95fb
SHA512c970e7c8587cb56e4a456cd3f6d0f380ef3890b9239587971413eb00b751ad55c0237200c29de6664be3b557885734856dadbc96ee4614de72c5568775cdd718