Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2849692s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
23/12/2023, 11:30
Static task
static1
Behavioral task
behavioral1
Sample
03a70f0f00895915c2edb564f76e5182e4ab854c720b32c22b5b33e4ed79ef3b.apk
Behavioral task
behavioral2
Sample
03a70f0f00895915c2edb564f76e5182e4ab854c720b32c22b5b33e4ed79ef3b.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
03a70f0f00895915c2edb564f76e5182e4ab854c720b32c22b5b33e4ed79ef3b.apk
-
Size
17.1MB
-
MD5
28f508ea8f0e188fcf1797217cd5fd23
-
SHA1
e2734533d4d44af5d33212f32118802debde7f70
-
SHA256
03a70f0f00895915c2edb564f76e5182e4ab854c720b32c22b5b33e4ed79ef3b
-
SHA512
709101e302358480459b365da420d2ed9a400184e8208139cefd0d4c8989c11058ff4932e06ece26887b4def9a56cc215ec8d1fdab9907769f09e31b0a64aae1
-
SSDEEP
393216:dZcZHuSr5uINFtmJXkmrgnZHh+FJhu+oqNFZlCM:dZ5Sr5+qmUB8Pu+o0d
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/cn.yuhang100.yrt.trunk.android/[email protected] 4591 cn.yuhang100.yrt.trunk.android -
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal cn.yuhang100.yrt.trunk.android
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52f139250f8f4de19355450bf2054434e
SHA18c8463eb43387f7a7cc7166ffcf0e8ffbb15f4d4
SHA256f06c74e23081df3f93114b250ed918bab56805c62be721373ed5a58d0e8b7bd5
SHA512fc0e68f51bc58e064629ab8474a3684d37d0decaa2170c093561863bca38c6d620eee6305610f72fe437e522046f5afd4a8819bae27db226d968f4850648d7be
-
Filesize
63KB
MD5ed73a80eb949bacc52428b8d5a087fa5
SHA107e973549a2cee61ffeeb6439abc419cd8a489a9
SHA256f0ead1ad60e0cc310c1a40685c28fc7a69aa346604552816c51dd3c1718a1e76
SHA5124bc26c18ca3a2edfe38ca1e14ad1e1415268b4a69cdff3c0f8e2b8fa910c67c2e4bc4f32c21274e586e8e139122ea3dbde7ec507c4722b4a9a778ee2598090b8
-
Filesize
63KB
MD55061e4948844f7d366972ac8005e9f13
SHA1a2b79a1c79afb095ddebf0f16a1f9db64482bcaf
SHA2563aa6caecfcd101531539147e01382bc530b4fdc61e98937d63cc4648793c6a45
SHA512223d18ce248912df18cdea3c8e864ea5e6ec058ca42cc5fde738188c54abcd260d7f24ac53d4987d3e32f4ae3e1e40e01354054d035bb100eef51b2d695f5299
-
Filesize
444B
MD57045ca64242a105810035123cb396173
SHA17a8febd75f2863ff71a5866a1a48948a7e7b8ab3
SHA256de59d37e6548105e8f649c49e2468479e9120685b9f917a45fac0424d04605d2
SHA5126d6c4396a837f00ca43d782a1b9cccb426625f14dbaafeaee795561125963cc0431fd82262b9aff8d0b0c69a4cba20329725e85abfcfdf92150dee32c4f9a36f
-
Filesize
5B
MD5c06857e9ea338f3f3a24bb78f8fbdf6f
SHA1c5a0a2529d2deb60fec041b4fbd722a2ebe31702
SHA256957b88b12730e646e0f33d3618b77dfa579e8231e3c59c7104be7165611c8027
SHA51229f61516876c25379a7bf4faa2b3ca6f6b53eac90e7de47671fec4a818d51441b4025cd7909f7c0a0d113ab6c5ff00cb3700c286bac7319185b77905feec4fb1
-
Filesize
1B
MD555a54008ad1ba589aa210d2629c1df41
SHA1bf8b4530d8d246dd74ac53a13471bba17941dff7
SHA2564bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a
SHA5127b54b66836c1fbdd13d2441d9e1434dc62ca677fb68f5fe66a464baadecdbd00576f8d6b5ac3bcc80844b7d50b1cc6603444bbe7cfcf8fc0aa1ee3c636d9e339
-
/storage/emulated/0/Android/data/cn.yuhang100.yrt.trunk.android/apps/__UNI__26E81A9/temp/1703656626545 (deleted)
Filesize1011KB
MD5aa6b7f4e5fc66bd18fbf309bccbc1b3e
SHA145ca3a6d48dcf5b39040d0d1279f18eb06589d32
SHA256f13da12597ac8d23b9da703346c08fca3a652a010de0dd5acbc95a255fc15113
SHA5129488f68cc64a2cfdd534155fbdc6685acab861dae5883f67ae907203b7f07edbc9b0d978a3be7f1b55299b93dcfb98ad11cb949f683eff136f017bc9ef3e497c