Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
202949s -
max time network
107s -
platform
android_x86 -
resource
android-x86-arm-20220823-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20220823-enlocale:en-usos:android-9-x86system -
submitted
11/05/2023, 18:33
Static task
static1
Behavioral task
behavioral1
Sample
0de832302ec11bcfda465e903fcd66b2a0bcc8c2b627b43196ef76ca02899765.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
0de832302ec11bcfda465e903fcd66b2a0bcc8c2b627b43196ef76ca02899765.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
0de832302ec11bcfda465e903fcd66b2a0bcc8c2b627b43196ef76ca02899765.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
0de832302ec11bcfda465e903fcd66b2a0bcc8c2b627b43196ef76ca02899765.apk
-
Size
560KB
-
MD5
fbf3348f3137dd673745677ffd8e91ff
-
SHA1
4ef579ec156a4e6aa2f9e72c56819f7c9e060f05
-
SHA256
0de832302ec11bcfda465e903fcd66b2a0bcc8c2b627b43196ef76ca02899765
-
SHA512
78f82792f52c8e2263f73c3e732c989130430140b6c47ac8935aa564e59cf2302e8bd52ddba74b5bbffa407f0070a8a88e82c349c754c8a68cda416ba35e4496
-
SSDEEP
12288:rSPRSBpD41leMx4PsvRO33ncpQdtq+taBgYXjEAC:rD4neMSHMQdGBgYXjEf
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.paranbijuv.aijuy -
Acquires the wake lock. 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.paranbijuv.aijuy -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/kartisx.jar 4056 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/kartisx.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/oat/x86/kartisx.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/kartisx.jar 4009 com.paranbijuv.aijuy -
Reads information about phone network operator.
Processes
-
com.paranbijuv.aijuy1⤵
- Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
- Acquires the wake lock.
- Loads dropped Dex/Jar
PID:4009 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/kartisx.jar --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.paranbijuv.aijuy/app_sgdgmcumf/oat/x86/kartisx.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD5ed67bcfa567bb2d94c16eba935e17306
SHA161598d620767220f63d645453ebd12dd49e050a0
SHA256d54f92c248831084d5b77eb1161f53410c2d3df814680af915918bdfdef0b25a
SHA5128580021000d0925d86aa609aba40dc91bec176516c7f20daa890c3e9828d33bbaa45902526bdf70ffdf8e933bcefe0f3c374bc22d77821fcbab0ec425ded9a7a
-
Filesize
558KB
MD5d0410aa6e99968935f2f9847aaa345e3
SHA196c584ff8d9213432fca0521945a841108ab2bcc
SHA256c5eb7ec669c78613c5a33ef58cc4476ea70bf79040fca60290bb78514d9ae58a
SHA5125c645306dca93f0fabab23e430d6f2f70c96edd8e713071299cf3a6ea40123712cd2460e81dbf620e9131db3d27807b0c136edaebb5700578b0e80d15ff83acb
-
Filesize
558KB
MD50a2f026036505aeecd65339d26dc3d2f
SHA17a0576a8b2138d0e42bf73ca3e4f071b40524c1c
SHA2563b3437b4b6ebb65dda61331f48da83674fbd144b49fbd883578e9896497cde1b
SHA512417b842a671a9d4e4496ddadb8f97a281c0b64fb4803b674ba39012897ab45c41921b9e0cac4d17bba1b7435053a6a540103f04b9d52b3fcc0614b0b9e5f4ea4
-
Filesize
114B
MD5455c3696936dff5650602bf73ffc25b0
SHA1e962e7cc389f483caab939c77e0a7fe2dec6c379
SHA2564531a9f2204ae282463e15bca2dd88f410fda61a57af8ec03385d1b05434e31f
SHA51278e69afe2ddb8d41fc8e05c251e9cc14e6040aebcd7b354287667894567066518c25fce4c3a435fbafeba122fd080d7c70076dcf20e837950e71a6c0a0bc615b
-
Filesize
2KB
MD536411e7b9f2be394ccad90e8dd64086d
SHA135934d5769615678795ca1301e06fbf97fe31857
SHA25604cee2a618890a72316f707849a1e7aa71fbc5068c38fcf6d06cb6df57501ee4
SHA5126ea56d1840c05ea205db6b53a8a56b789e61ae0850a1caa108bc29ca7c1d9af9826f612bae01af1124284d1c003a0acf2ae1ead98df100545a27bbdcbf87b5a9