Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2304461s -
max time network
148s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
20/12/2023, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
7ee960512983796848c432aacad8b8eafee37bce6a16d031726672bb611dad79.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7ee960512983796848c432aacad8b8eafee37bce6a16d031726672bb611dad79.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
7ee960512983796848c432aacad8b8eafee37bce6a16d031726672bb611dad79.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
7ee960512983796848c432aacad8b8eafee37bce6a16d031726672bb611dad79.apk
-
Size
1.7MB
-
MD5
94900fcbce6801a6f6c7dc751a7496c5
-
SHA1
578a7afec658622d07579883d4760340f49bffe0
-
SHA256
7ee960512983796848c432aacad8b8eafee37bce6a16d031726672bb611dad79
-
SHA512
2d3814e05a06c99b56d320eebf05b8701a17eff0b1fc3b009a5641795af2880e73fb318e81f060cac15b39ca035f32e10d3d033633b956b41ca3a26fcf7d890a
-
SSDEEP
49152:zs+zkezkr4yIijU5G/9gehJ1hPMA1spjgqXyi7OrUAW3QOjIlegV00I:zsykokslijU5w9g4JbMA12j0fpKQOjwk
Malware Config
Extracted
cerberus
http://yeniyilkutluolsun.space
Signatures
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.hood.kind Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.hood.kind -
pid Process 4961 com.hood.kind -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.hood.kind/app_DynamicOptDex/HKYy.json 4961 com.hood.kind /data/user/0/com.hood.kind/app_DynamicOptDex/HKYy.json 4961 com.hood.kind -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.hood.kind
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5b236909500f036adb9cebe0e54da36e8
SHA16c88e9784655f0d8ede24bda15e85a591c2e7528
SHA256758760c68572007d144077ff32e0abf789cd6d082ad53033b30dac26479cc113
SHA512ea6f29cd6a50f2774da5d17a7006d64738a2bc1f31d11d2745fcf541f2098b67c9a23661dcb982b0de67e14920a8d4d866905bec8d087fbb020573357a763699
-
Filesize
124KB
MD50d85c6d2eeaaa7e0b17096d86b2b2014
SHA149b037546b21bfe52da0e9b6f7ffc753f41230d4
SHA2563587212daf58ed3049b8d74a8a47419c1fd09115bc7114e82b9408c035fe8606
SHA512b08da2241cb44215f17821066ded1aec0a64c64a48bc6d397e8ab1acd9fe00fcaa15108f0e264d4dbf296994047604953331c64b2348fb8f4eb941bacb6239a9
-
Filesize
172B
MD52590be971b9007afaa1718b499a49690
SHA156318809c612dfbc8b62248265489056007938bc
SHA25666330cb463ff82f31267d07882e987e75025add8ba0f8eda13e10521dbaade4c
SHA5124eda00a1ae1cbc0c4767e2d5d96775914ac3afbcdf919a9ca82042c7105d917b0e9732a072d2848ab8c18aa07d556b43bf725085b8ba938228c920ff24c632c9