Analysis

  • max time kernel
    432s
  • max time network
    539s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    31/03/2025, 21:58

General

  • Target

    Magisk-v28.1.apk

  • Size

    11.2MB

  • MD5

    ebe29762bb3ba4397462812ecf28ba0c

  • SHA1

    c1611cf8276883622f5c2ede709113ffc7ec8227

  • SHA256

    8bfd3346b3da5814f82eff6f1b1b5fedd0ad585f39a25709b23eb54aac45691d

  • SHA512

    82ef2227f34315a60bdcbe1be10df6b5c2c76ff10b778760a2a53c1299cb2cb75c94f5c239ecfa9d0da3eabb738937db117a4ae55b1c7f74f93af236a1d83cd3

  • SSDEEP

    196608:0GaYVcVS4OlQ4OB2oTn9ko7scmdA5ASw7liDOLANeHqghsH5Wt5Red+La06NSnzG:0GbwUzbokAscmgq66ANGqCMdLzAS

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Magisk-v28.1.apk
    1⤵
    • Modifies registry class
    PID:1872
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads