Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1094a154e178...01.apk
android-9-x86
823F3A6.png
windows7-x64
323F3A6.png
windows10-2004-x64
5a4428ea2a8...ef.exe
windows7-x64
7a4428ea2a8...ef.exe
windows10-2004-x64
7eb8458671e...95.elf
ubuntu-18.04-amd64
1f26ed5601a...81.msi
windows7-x64
6f26ed5601a...81.msi
windows10-2004-x64
6Analysis
-
max time kernel
1782348s -
max time network
68s -
platform
android_x86 -
resource
android-x86-arm-20230621-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20230621-enlocale:en-usos:android-9-x86system -
submitted
18/07/2023, 18:19
Behavioral task
behavioral1
Sample
94a154e17819374c909d1e081a6032cf26b622f916ee6a59f8d8ddce9b50f901.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
23F3A6.png
Resource
win7-20230712-en
Behavioral task
behavioral3
Sample
23F3A6.png
Resource
win10v2004-20230703-en
Behavioral task
behavioral4
Sample
a4428ea2a84c197502595fa85062995ea128355f66d695b76c8911bd6c519bef.exe
Resource
win7-20230712-en
Behavioral task
behavioral5
Sample
a4428ea2a84c197502595fa85062995ea128355f66d695b76c8911bd6c519bef.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral6
Sample
eb8458671e178c0159ba0bc3936739d6c0d573df00040d6bcc4ee699302a3895.elf
Resource
ubuntu1804-amd64-20230621-en
Behavioral task
behavioral7
Sample
f26ed5601a8a2d5abfa4a527b468a18023311e32338dfabff987159d37df3981.msi
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
f26ed5601a8a2d5abfa4a527b468a18023311e32338dfabff987159d37df3981.msi
Resource
win10v2004-20230703-en
General
-
Target
94a154e17819374c909d1e081a6032cf26b622f916ee6a59f8d8ddce9b50f901.apk
-
Size
17.7MB
-
MD5
a272f470bcd451a90d37870b4f55235d
-
SHA1
64748535e6ec3cbe2b1e5c0c2c97eb768b65f6ce
-
SHA256
94a154e17819374c909d1e081a6032cf26b622f916ee6a59f8d8ddce9b50f901
-
SHA512
3c8c3cb5e00593a27e7902c9fddf3dea6c7b1608a8f4bd25cf3b77cc4cb99473fcf91b58b6437a932eb485d175621f082803119de83f4a461f6bc4e713f9fcaa
-
SSDEEP
393216:4zkF7O4P49K6MnFw+wIGY7og1I99RGKl4JquaQ+pBXYbQe/hzvZlsbD:4YF7/PDKD3Y7Lc9RJqnUXYbJzvZlkD
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps). 1 IoCs
description ioc Process Framework service call android.content.pm.IPackageManager.getInstalledApplications com.rockstargames.gtasa -
Listens for changes in the sensor environment (might be used to detect emulation). 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.rockstargames.gtasa
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD528adbe1463a9c4903454e705531ef71f
SHA13d651c25dce1659c38f1bee00ae9b1104b3f0090
SHA2561c2fca0fffa3dbc9e6d28ca8768d40de1a1cc41c35ecea68eea5a47d5430c93e
SHA512082db983989ee2beca714f08b45b413b1b7b2bf89e5b7a0b9225fd6bceed04563346a690a1371a797d7d988122d7612246726868490a2bcdba2a0363796c64c9
-
Filesize
4B
MD5907ea0b4ab6b8a9c4af64fd151a2ea1e
SHA10b8ba7061b2a915e34fec494052fee829339c307
SHA2566b54ef0f2b5a5ef8e655f3ee42f1630f4f098d1007decc5ca13855879dd63657
SHA512f2a997979ea558cd468a318e7413ed41379c68a3608a17ac4a2d0010a1897ffac25b790a7bed3586c9e195cd7f2f335d1e8d3d3800e4b9c2ccb159592fdcffb0