Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
1MonthlyIdo...pk.apk
android-9-x86
9DefaultWsd...tor.js
windows7-x64
1DefaultWsd...tor.js
windows10-2004-x64
1machine.xml
windows7-x64
1machine.xml
windows10-2004-x64
5settings.xml
windows7-x64
1settings.xml
windows10-2004-x64
1web.xml
windows7-x64
1web.xml
windows10-2004-x64
1General
-
Target
MonthlyIdol851apkapk.apk
-
Size
51.8MB
-
Sample
230630-sp6wxaef4y
-
MD5
e92d8d0dcce475f6ba6204971cb56ea8
-
SHA1
5e9fd60561fb144a9a883ece6f9c5f9560c07a36
-
SHA256
d18ce36f11639ee23464c6bcd75dbca7089a2daa322fbbf75fbd28d4ff6f9389
-
SHA512
bffd88434b8450160d07660d8a2b058ec90a9a1ea54390e92cbc20fe7a6af164bf73d7d9d9e7730ba718dbbccf92e770f50035dd2dc90498d3aded8a7e47b890
-
SSDEEP
786432:lxtaG6kiV7KFmmDPoY8Gca17r9PfwXnWvB8CzxEk41LwnwUFGM8WKtsVoY:taGRyY8Gcaxr9fwXn+BDzyJUnPJ3
Static task
static1
Behavioral task
behavioral1
Sample
MonthlyIdol851apkapk.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
DefaultWsdlHelpGenerator.js
Resource
win7-20230621-en
Behavioral task
behavioral3
Sample
DefaultWsdlHelpGenerator.js
Resource
win10v2004-20230621-en
Behavioral task
behavioral4
Sample
machine.xml
Resource
win7-20230621-en
Behavioral task
behavioral5
Sample
machine.xml
Resource
win10v2004-20230621-en
Behavioral task
behavioral6
Sample
settings.xml
Resource
win7-20230621-en
Behavioral task
behavioral7
Sample
settings.xml
Resource
win10v2004-20230621-en
Behavioral task
behavioral8
Sample
web.xml
Resource
win7-20230621-en
Behavioral task
behavioral9
Sample
web.xml
Resource
win10v2004-20230621-en
Malware Config
Targets
-
-
Target
MonthlyIdol851apkapk.apk
-
Size
51.8MB
-
MD5
e92d8d0dcce475f6ba6204971cb56ea8
-
SHA1
5e9fd60561fb144a9a883ece6f9c5f9560c07a36
-
SHA256
d18ce36f11639ee23464c6bcd75dbca7089a2daa322fbbf75fbd28d4ff6f9389
-
SHA512
bffd88434b8450160d07660d8a2b058ec90a9a1ea54390e92cbc20fe7a6af164bf73d7d9d9e7730ba718dbbccf92e770f50035dd2dc90498d3aded8a7e47b890
-
SSDEEP
786432:lxtaG6kiV7KFmmDPoY8Gca17r9PfwXnWvB8CzxEk41LwnwUFGM8WKtsVoY:taGRyY8Gcaxr9fwXn+BDzyJUnPJ3
Score9/10-
Renames multiple (52) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks Android system properties for emulator presence.
-
Checks Qemu related system properties.
Checks for Android system properties related to Qemu for Emulator detection.
-
Reads information about phone network operator.
-
Removes a system notification.
-
-
-
Target
DefaultWsdlHelpGenerator.aspx
-
Size
59KB
-
MD5
f7be9f1841ff92f9d4040aed832e0c79
-
SHA1
b3e4b508aab3cf201c06892713b43ddb0c43b7ae
-
SHA256
751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
-
SHA512
380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
SSDEEP
768:6CEPutHjvpMgMwP9h5Ij7khsp/6JtEZwMXVtkUI3t3CXyEyk3VbNbqDvJ4oT1y:/r6CdsCOZwMX3k5dWyklh+Dvbw
Score1/10 -
-
-
Target
machine.config
-
Size
33KB
-
MD5
0869544722561f5aff0eefc83fc7b001
-
SHA1
1e118f4b5c1c6a7b1858e3fccb1b1d1095561976
-
SHA256
ef9b9387168fd1dd6c996f96c134d9c44f8eb06f9587004bf997252a520182d6
-
SHA512
ced7c9a5363cabdb87b01ed6b4ca190a690640dddf5cbcc0438acdc611a8ee942cb6cd73c78d3fc2d59f70171f22ac832a10b1e23758dc92599ee24acd978ac2
-
SSDEEP
384:PbtltttttSRtNRtcRtGrRtSRtTf5Rt70zDgRt2Rtuj4f1RDRty6ugyunHMSeuWuh:dkn
Score5/10-
Drops file in System32 directory
-
-
-
Target
settings.map
-
Size
2KB
-
MD5
ba17ade8a8e3ee221377534c8136f617
-
SHA1
8e17e2aec423a8e6fb43e8cbe6215040217bb8a3
-
SHA256
ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8
-
SHA512
c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297
Score1/10 -
-
-
Target
web.config
-
Size
18KB
-
MD5
08101241b15b53ef0ab908f6d388881f
-
SHA1
ea3e2ad6d71d483c54b12852dcbdcd0baa569988
-
SHA256
15a2c7a9242bf54d3ccb3e07fa6d8f84ba8b303d8877243787a1103009941bdb
-
SHA512
a1ee7f17bb069ac42483d1f98ca839ff1bd06f3fc15cd379dff4aca3732a5dac24dc17e15acc8f8fa39e60e186219f4fd70664f9ea284002274a4ff8609791ed
-
SSDEEP
384:lJJuAr8F1mJ1ayCk5+HK5YaW41DBWTwa6st/tlLvSqwwU4FVXaS7L3nHIXYFXc//:jbpJi91Xbi
Score1/10 -