Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
107f4670ae85...d8.apk
android-10-x64
7f4670ae85...d8.apk
android-11-x64
17f4670ae85...d8.apk
android-9-x86
10introduction.apk
android-10-x64
introduction.apk
android-11-x64
9introduction.apk
android-9-x86
9ring.apk
android-10-x64
1ring.apk
android-11-x64
6ring.apk
android-9-x86
6General
-
Target
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8
-
Size
10.7MB
-
Sample
230526-fwmqdsdh49
-
MD5
703b22fcea432d2c681cebbc150394f1
-
SHA1
f561e628ae17d7a547ca55b0be72ebaf1ed88af3
-
SHA256
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8
-
SHA512
aecedd324311c3e95a93ad4129eddc4e46974db635e71bec406256be91bac7a1cb2817ea6b6e410a58d669cd32af4605ec393e5273d62ff078fa6bc9cd1fea1c
-
SSDEEP
196608:ZynCaYQLCbkUYUMjNgR39mR70CyCopc24BFix/Q+hT1/XQqrj:G5YQCYeW90C8D4DiFZhmqrj
Behavioral task
behavioral1
Sample
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral2
Sample
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral3
Sample
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
introduction.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
introduction.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
introduction.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
ring.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral8
Sample
ring.apk
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral9
Sample
ring.apk
Resource
android-x86-arm-20220823-en
Malware Config
Extracted
fakecalls
http://o20.orange-app.today/
Targets
-
-
Target
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8
-
Size
10.7MB
-
MD5
703b22fcea432d2c681cebbc150394f1
-
SHA1
f561e628ae17d7a547ca55b0be72ebaf1ed88af3
-
SHA256
7f4670ae852ec26f890129a4a3d3e95c079f2f289e16f1aa089c86ea7077b3d8
-
SHA512
aecedd324311c3e95a93ad4129eddc4e46974db635e71bec406256be91bac7a1cb2817ea6b6e410a58d669cd32af4605ec393e5273d62ff078fa6bc9cd1fea1c
-
SSDEEP
196608:ZynCaYQLCbkUYUMjNgR39mR70CyCopc24BFix/Q+hT1/XQqrj:G5YQCYeW90C8D4DiFZhmqrj
Score10/10-
FakeCalls
FakeCalls is an Android banking trojan first seen in April 2022.
-
FakeCalls payload
-
-
-
Target
introduction.html
-
Size
9.9MB
-
MD5
c49b09791a37654a3ffd38e27a11ee98
-
SHA1
447bf2765a8c24daafb09ffa1229a1180e77c230
-
SHA256
a65994b7ce0a8dfa02eb5d0b918cc6361212dbad901f27425620d814088aa657
-
SHA512
73805ddd4e19d4d39e1449e2b2f95cbcefc805a24c41ef7ed1fb0d20370c17c17731338029d6505dc8b93ea3051e000e044103e880c607249d2cfce8a94f1a2c
-
SSDEEP
196608:VOBv2iwEXoOjdHnopTKz1sjCbWWQsgtBHZ/pGBX+Y+IbL4k:VEvTwEX5dQjCbXgtZGIdIbJ
Score9/10-
Renames multiple (130) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Renames multiple (148) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads information about phone network operator.
-
Removes a system notification.
-
Uses Crypto APIs (Might try to encrypt user data).
-
-
-
Target
ring.html
-
Size
799KB
-
MD5
7e8306dcce35fc73a040bd66114e12bb
-
SHA1
94fa85ebb971e8fa5fdae099bb62472686122664
-
SHA256
706e662046e2bcd67d37779e87212286cff47164bbe7e8c4dacb3d6e6e5fe9b1
-
SHA512
f844ecf01e075cb29aa029b685894b2c29194f659c9b7d4a8c8f041182b57c4e0c6d5276c455bbe6a4c5c89081c49a6e2748f93f329faa32d4f62bab87df12c7
-
SSDEEP
12288:gA3szfEz8GqdmcR+0vjUAZuIURbFd2L6xnnjILH6Asw8gAtkDbMKHv:OfHsL0vIgOFd2+xnjILj8geOMKHv
Score6/10-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-