Last 7 days

Mar 2, 2026
SHAs
2
C2 Total
4
C2 Unique
4
C2 New
4

Behavioral Tags

spyware100%android100%trojan100%discovery100%impact100%infostealer100%

MITRE ATT&CK Techniques

T1633.001System Checks
100%

Adversaries may employ various system checks to detect and avoid virtualization and analysis environments.

T1471Data Encrypted for Impact
100%

An adversary may encrypt files stored on a mobile device to prevent the user from accessing them.

T1426System Information Discovery
100%

Adversaries may attempt to get detailed information about a device’s operating system and hardware, including versions, patches, and architecture.

T1421System Network Connections Discovery
100%

Adversaries may attempt to get a listing of network connections to or from the compromised device they are currently accessing or from remote systems by querying for information over the network.

Port Distribution

443100% · 4 hosts