Analysis
-
max time kernel
136s -
max time network
135s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
submitted
20/02/2025, 02:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Resource
macos-20241101-en
General
-
Target
https://auspost.ek0y2w.icu/receive/order/enP8SHl347C
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD588296777fdba86d0097b3a9d17509ef4
SHA16458d3c6ac6057698d03cd5f39a352f64b2ab5a1
SHA25607db39a331ea6e55a08686be321ec16e65a6ffd99807bc2bf7402e0d5ae865ee
SHA5129ee7f340495c6aa91595c6d57fa57fec4090244d71a23e5c4704e8cbb35c677f00242368c1e0f96ae79057516ff7e596865a9a7f179e3bb82bdb5520f25a3723