Analysis
-
max time kernel
150s -
max time network
284s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
09/04/2025, 07:21
Static task
static1
Behavioral task
behavioral1
Sample
ff.html
Resource
android-x64-20240910-en
Behavioral task
behavioral2
Sample
ff.html
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral3
Sample
ff.html
Resource
android-33-x64-arm64-20240910-en
General
-
Target
ff.html
-
Size
7KB
-
MD5
feee8385904c56c40c09d6a57cb37482
-
SHA1
9f1e8332feed2d74a51c9731db3669a3c4db4643
-
SHA256
e04091536edb7670381cd07dd4a5c500d27e078053b4f9e0ad314becdd70d87c
-
SHA512
44e39dcf334a1eff3c9d7d6a3f86035094db847322e7c5ae622708045fab6bff3ac0fd836dd25489f8090b0d2227b944dbeae1649f8d9194cd2cfadc26fdff37
-
SSDEEP
96:OfWVTg693p1A7IewHFwyJgOHgQ8Bs1EszU/vifEviDMD:+mU693p1A7powyJBAQ8rHikiDMD
Malware Config
Extracted
ahmyth
http://147.185.221.17:25603
Signatures
-
AhMyth
AhMyth is an open source Android remote administration tool.
-
Ahmyth family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 28 raw.githubusercontent.com 29 raw.githubusercontent.com 30 raw.githubusercontent.com 24 raw.githubusercontent.com -
Requests dangerous framework permissions 20 IoCs
description ioc Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES Required to be able to access the camera device. android.permission.CAMERA Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to receive SMS messages. android.permission.RECEIVE_SMS Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to read the user's call log. android.permission.READ_CALL_LOG Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to record audio. android.permission.RECORD_AUDIO Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to access location in the background. android.permission.ACCESS_BACKGROUND_LOCATION -
Checks CPU information 2 TTPs 3 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 3 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome
Processes
Network
MITRE ATT&CK Enterprise v16
MITRE ATT&CK Mobile v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.0MB
MD5ae86150a775bdfc228ee37267e95706e
SHA1db82cd7092dec2d6fb8354bfcbb9225e6ea12240
SHA256c527259d27d289339e77513aecfa15441366fd0ebaa2165250578bb8362292ce
SHA5127a6ce460b9bf0f10e81067a4849c13c6081eb923bc461fbb5f51253b1c3e3aa89bc7d13b53424e9f5d916e39ddf0cf1617313340d421cc90dafbe31c5517dc9b
-
Filesize
37.4MB
MD5848920df47508f0316be22ac51ac88e5
SHA144c65cb043c4485e6fedb1123a2ab0f11c24b8d8
SHA2567daef80bc7cd3ec6303ffd1e07d06982431b2c29685fbf9f95367a9ad4521b2f
SHA512dcc1ef0559e7c7c01ba4b5e3d87f7cbac9ec2a113761c2d0bd081d8834f71fa809d27857c2d64735769c093b2e4137f5aa23547c977bb0ae53dd01c855674f23
-
Filesize
512KB
MD559071590099d21dd439896592338bf95
SHA16a521e1d2a632c26e53b83d2cc4b0edecfc1e68c
SHA25607854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541
SHA512eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668