| URL: | https://modyolo.com/download/payback-2-9670/1 |
| Full analysis: | https://app.any.run/tasks/34f5566c-0414-4288-bd8f-7de64f542998 |
| Verdict: | Malicious activity |
| Analysis date: | April 20, 2025, 22:05:37 |
| OS: | Android 14 |
| Tags: | |
| Indicators: | |
| MD5: | 14850B47607CEB83B8F31E967F35D776 |
| SHA1: | 2F1471BA3F8213A83A7822AC04E6941282047220 |
| SHA256: | 05AE0EA66F248CEBE1B6090193619CA42710EAE0B4EF3D896BFD3FB74532ABAA |
| SSDEEP: | 3:N8jcSTG8LTkZqIxVKU:2gwsZzxR |
PID | CMD | Path | Indicators | Parent process |
|---|---|---|---|---|
| 342 | /system/bin/netd | /system/bin/netd | init | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2186 | org.chromium.webview_shell | /system/bin/app_process64 | app_process64 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2212 | zygote | /system/bin/app_process32 | app_process32 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2227 | webview_zygote | /system/bin/app_process32 | — | app_process32 |
User: webview_zygote Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2266 | zygote | /system/bin/app_process32 | app_process32 | |
User: root Integrity Level: UNKNOWN Exit code: 0 | ||||
| 2368 | com.android.traceur | /system/bin/app_process64 | — | app_process64 |
User: u0_a53 Integrity Level: UNKNOWN Exit code: 512 | ||||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 204 | 142.250.186.67:80 | http://connectivitycheck.gstatic.com/generate_204 | US | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
449 | mdnsd | 224.0.0.251:5353 | — | — | — | unknown |
— | — | 216.239.35.8:123 | time.android.com | — | — | whitelisted |
— | — | 142.250.186.67:80 | connectivitycheck.gstatic.com | GOOGLE | US | whitelisted |
— | — | 216.58.212.164:443 | www.google.com | GOOGLE | US | whitelisted |
— | — | 64.233.184.81:443 | staging-remoteprovisioning.sandbox.googleapis.com | GOOGLE | US | whitelisted |
2212 | app_process32 | 216.58.206.35:443 | clientservices.googleapis.com | GOOGLE | US | whitelisted |
2186 | app_process64 | 104.26.8.40:443 | modyolo.com | CLOUDFLARENET | US | unknown |
2266 | app_process32 | 142.250.185.67:443 | update.googleapis.com | GOOGLE | US | whitelisted |
2266 | app_process32 | 142.250.185.142:443 | dl.google.com | GOOGLE | US | whitelisted |
2186 | app_process64 | 142.250.185.232:443 | www.googletagmanager.com | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.google.com |
| whitelisted |
connectivitycheck.gstatic.com |
| whitelisted |
google.com |
| whitelisted |
time.android.com |
| whitelisted |
staging-remoteprovisioning.sandbox.googleapis.com |
| whitelisted |
clientservices.googleapis.com |
| whitelisted |
modyolo.com |
| unknown |
update.googleapis.com |
| whitelisted |
dl.google.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
— | — | Misc activity | ET INFO Android Device Connectivity Check |
342 | netd | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (naupsithizeekee .com) |