Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137
-
Size
14.0MB
-
Sample
231223-rlywfsfgd4
-
MD5
f1a6c100aabc0ee827ed2e82add42e26
-
SHA1
352de0443a116b1f4d77588e9e37f03565f56fda
-
SHA256
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137
-
SHA512
46b4dda7b277bf02f39128403e609e9a63b1693d5211b0b18304148fa63065131fc651d8236ec718f665ea3e4931587f5141682c28d6945182c7781bac459f09
-
SSDEEP
393216:c3JcdPkBOg6kdEtFgFP2UhYVNxJB1VxNOQ7W7n5Cd:c3xwgTEQFAJ9xgQS5k
Static task
static1
Behavioral task
behavioral1
Sample
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
alipay_msp.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral4
Sample
alipay_msp.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
epayx.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral6
Sample
epayx.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral7
Sample
epayx.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137
-
Size
14.0MB
-
MD5
f1a6c100aabc0ee827ed2e82add42e26
-
SHA1
352de0443a116b1f4d77588e9e37f03565f56fda
-
SHA256
2cf7003f283eb4b2ca640366e5de8b4b7ded5ef901bc88b883c6999a13f14137
-
SHA512
46b4dda7b277bf02f39128403e609e9a63b1693d5211b0b18304148fa63065131fc651d8236ec718f665ea3e4931587f5141682c28d6945182c7781bac459f09
-
SSDEEP
393216:c3JcdPkBOg6kdEtFgFP2UhYVNxJB1VxNOQ7W7n5Cd:c3xwgTEQFAJ9xgQS5k
Score7/10-
Checks Android system properties for emulator presence.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Requests dangerous framework permissions
-
-
-
Target
alipay_msp.apk
-
Size
748KB
-
MD5
d06ea38e4210a87d6b96f8b0491df677
-
SHA1
3ba573396398757088e559a9d372049a377eb05a
-
SHA256
76a24f83ad15586ff9a2081e420a707be9ddb0b5047e5b6de5974c41624ff2c1
-
SHA512
3d43e5bfad2b703a804a53048b6a88228a11fb80ac641d6594f774cc07f6c7367e0ee80b29966d02c9206542f467f55b0f1ddbbfef0ec372256314a7d1071f30
-
SSDEEP
12288:IjRAsoln+WMB1EgrGERh4xWgtSM7vXrRCn4I5p2Cnfv:IjRApZ+WM7yER61P7jw4IGSfv
Score1/10 -
-
-
Target
epayx.jar
-
Size
175KB
-
MD5
e70d3c3ff87401690af6a24542304a6c
-
SHA1
4ed2a412969626fb6f7cba98338c29160f9b99c2
-
SHA256
6a752a41d365e98a27cdad043a69d688b320df708227deb182b276ef14e87351
-
SHA512
15b102a0397becccaf1780df053290e4569b4fe3c28cf722922df7dca3cb72b8ebf89ab33cea62354038eaf3d1dbad39f3696ced47ceeb0365b84a5716b57548
-
SSDEEP
3072:Zaau3uCBHk77yuepqPs7R35NON2UUuE2oFFN9aDDMVEnYdY+HUbfGer:Za7dHl0MR35NOUUqRFFN0v8EnYdYmU7B
Score1/10 -