Analysis
-
max time kernel
76s -
max time network
75s -
platform
android-13_x64 -
resource
android-33-x64-arm64-20240910-en -
resource tags
arch:arm64arch:x64arch:x86image:android-33-x64-arm64-20240910-enlocale:en-usos:android-13-x64system -
submitted
20/03/2025, 18:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://deltaexploits.gg
Resource
android-x64-20240910-en
Behavioral task
behavioral2
Sample
http://deltaexploits.gg
Resource
android-33-x64-arm64-20240910-en
General
-
Target
http://deltaexploits.gg
Malware Config
Signatures
-
Declares services with permission to bind to the system 1 IoCs
description ioc Required by telecom connection services to bind with the system. Allows apps to manage phone call aspects such as call setup and notifications. android.permission.BIND_TELECOM_CONNECTION_SERVICE -
Requests dangerous framework permissions 4 IoCs
description ioc Allows applications to use exact alarm APIs. android.permission.SCHEDULE_EXACT_ALARM Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an app to post notifications. android.permission.POST_NOTIFICATIONS Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53ea64c28a8b44e4bd4510ac191da21a3
SHA106fc0ae988a7780bddfa337d5f85922b00688e04
SHA256c990819c18f71194e22dffb90006aad669091ddc0331ad426a569f8040c8afba
SHA512ae88bd9971ca36c4a30b6e684433193a9e26a3e34993b41681ef03b14bc9c846d803d8ef960d2a6b6d600ef0356bb2fcbd952121897bb672f77edf85aa0b749e
-
Filesize
1KB
MD5464707d886de8c2e020a47d2ae867c77
SHA172bda62ac3fd995135434a7b00bc3c42d0194c23
SHA2561074c63551d047f2d476828b415efeffaad68ef920032cfad4b6f2c843bd8f69
SHA5125840aed97502d4ce601bb6613a46fa4d3ff6a0fecdd1fc8f90977a21db932d4f575dde93e6d53910c1bfd8896863147a7de70c66bcd5611ef708cdb53b6c4b37
-
Filesize
56B
MD5cecb649cb1fb79c3736936fcbef3bbf2
SHA12c95183d7d2b0cd68d15b3c4115189351fc08720
SHA25609bda72e7c32a69e3268e0ebd8caa33684cbc954dd00c7d93a38830e348ef324
SHA512b8aca3cf0ea838093bd29b70ead608597260b0e35886d491d17c304878f99510fd885d96a191080acb5b706a642253bd9cbe5065ff234472b048fcce282061de
-
Filesize
170KB
MD56e67ab1c69dee3355c6fda75ad154e0d
SHA1c206ec801768a6fb3c4d55c0a6fbbf524ae3840b
SHA256978798b69d0d1e79f73b7edb8b71bdf364e298752f7ef7fc2c2853b8763a2359
SHA512361783e05f54705ae37cb44f8a9d7be335234b2b5144b897ff6dae7a07b2f166d2d099645d85e7fddd9d0c511eff2518668bbb079e544c458a18a98b8521f011
-
Filesize
170KB
MD57595c7a6231dd5b4f820179826ebec90
SHA1676a06e5eac36560b839c2c1445b5b8ad2406782
SHA256772a7a2e46a5aeca880465d07d814d797019cec105f0f8b7a86de8a7417e773d
SHA512efb7d5138f9ae7d8c99c587eb56251e963310d60255e19279e8d7439145be211e93161cd5e2cc67ac4d34f1c8e019a71073b0bbe9104e2a1dbe1c750bb91bece
-
Filesize
24.9MB
MD53940ff5aae637decf6b96c44f26408c1
SHA1a30cce42f20e22c76a153d99e625e74f1f7455fb
SHA25686888ede31216f0dbfe80a9952e6cc4b456a3ce509aefbd3e872e1d03ea23573
SHA5123044abe0cfdca6289a9e2eac0911c85cd9a5f83f50b3cd9c5bbf2788a3fb70c928f13e492afe2dd1549b23b3ebf85ced785f9e3ee02fc3db7fca930c60e717e1
-
Filesize
610KB
MD5090a1b05d6a1c7fa04354a7551875f92
SHA1bca6215a744aa97017e5453777f730849cf35296
SHA256d6b26ff392499c4e54c0267ccaf9c071fbfcef7cb5dfef37ee717ca0581f8bb8
SHA51248f755dd4bf27bbf87002e0a3742b7737bfa367a3bb4d90d4113f2da0c71e3a0f61dc8dc146585aa56bc350fdb4263a349603d5c8566f0ba4c0a0b4c685fe46c
-
Filesize
25.4MB
MD5e02ace4a2f739410205e4bb5224834e8
SHA1060719467ef76662de2ec18958e17029a77f395a
SHA2569259638aa5387ef3f970158563a6e5ca0ab6d9af3cb20efca8d80bfbfe32a10c
SHA51251d1dcff35754d10d4dee7a88e2fb6fbe84cc7cef25d22fed127bf492d75655d20b882065a863b36d4405119b4849e50ff33d4057c174afb8b500b650693dac9