Exploit Malicious APKs for Android Control
Tags
attack-pattern: | Server - T1583.004 Server - T1584.004 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 4d57f17b-f65d-4c78-91e1-f9e31a264575 |
Fingerprint | 3e2cfa5bfd04ef41 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Oct. 22, 2024, 4:46 a.m. |
Added to db | Oct. 22, 2024, 6:57 a.m. |
Last updated | Nov. 18, 2024, 3:30 p.m. |
Headline | Exploit Malicious APKs for Android Control |
Title | Exploit Malicious APKs for Android Control |
Detected Hints/Tags/Attributes | 18/1/10 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 4134 | github.com |
|
Details | Domain | 1 | androrat.py |
|
Details | File | 144 | requirements.txt |
|
Details | File | 1 | androrat.py |
|
Details | File | 1 | harshitmal.apk |
|
Details | Github username | 2 | karma9874 |
|
Details | IPv4 | 2 | 172.20.10.3 |
|
Details | IPv4 | 619 | 0.0.0.0 |
|
Details | Url | 1 | https://github.com/karma9874/androrat.git |
|
Details | Url | 1 | http://172.20.10.3/harshitmal.apk |