Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897
-
Size
15.7MB
-
Sample
231223-s1cgfahhh4
-
MD5
d92ed047115c4385087cb94be8158613
-
SHA1
42504f9a197f0b666e9658a44db4cdb84a427784
-
SHA256
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897
-
SHA512
d341a36b62733e729ff8974d178b27e77ebc8faa853c1d15e8ab2fcedc3eb7b4692a38d95ac42cd1a0e19219a0a3a4b36e8c703a4bfd844b6e2b18c2bbecce4e
-
SSDEEP
393216:8v9S0WCRwuhUeGxKRFKnNfUVPjBlJ10JdrqBq:8v95RwCUeGxWFKn0LfRBq
Static task
static1
Behavioral task
behavioral1
Sample
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral3
Sample
ad_adview.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral4
Sample
ad_adview.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral5
Sample
ad_adview.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral6
Sample
bdxadsdk.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral7
Sample
bdxadsdk.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral8
Sample
bdxadsdk.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral9
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Malware Config
Targets
-
-
Target
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897
-
Size
15.7MB
-
MD5
d92ed047115c4385087cb94be8158613
-
SHA1
42504f9a197f0b666e9658a44db4cdb84a427784
-
SHA256
3f5086d178a5abd1eac3274e3e156ae07e52665c7a9e5a52c324af40d4792897
-
SHA512
d341a36b62733e729ff8974d178b27e77ebc8faa853c1d15e8ab2fcedc3eb7b4692a38d95ac42cd1a0e19219a0a3a4b36e8c703a4bfd844b6e2b18c2bbecce4e
-
SSDEEP
393216:8v9S0WCRwuhUeGxKRFKnNfUVPjBlJ10JdrqBq:8v95RwCUeGxWFKn0LfRBq
Score8/10-
Requests cell location
Uses Android APIs to to get current cell location.
-
Checks known Qemu files.
Checks for known Qemu files that exist on Android virtual device images.
-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
-
-
Target
ad_adview.jar
-
Size
229KB
-
MD5
e46bcaf4224f32b9996240ff692ed7ac
-
SHA1
b53bfeed4ad097ebfd7bf2b6b1a3da49d9e367c0
-
SHA256
238f59710cb5c22075ef256ce3761d5b3132b38f68a35ebbb47d55701ebeecb5
-
SHA512
91c3b5e19f4c5b7729b911e00f3990581ad425df8ec8241d9501443fa0ef2e12875592ed70ff191bcc0aaacf0c1cd65990441c28abdc9b29fd3590006481c9d8
-
SSDEEP
6144:Xg0j6N/bAshX52Uct+3b3nbbY7H91AT8LdKrh08:pj6lAsX2UcK3bbwHnAQgd08
Score1/10 -
-
-
Target
bdxadsdk.jar
-
Size
195KB
-
MD5
c3b999326b7187bdd85fd971f93376d6
-
SHA1
978fa76710506b2aa2dc1502e2697355cc64e34e
-
SHA256
555e565b45d2b030652d914830ad427d15182797886316024a2f04df6ac81d5e
-
SHA512
240981a457a3df5ce7f51ae1e0b323efc37b349a261e21d52ef8e9256d758f5c7dd4bcd6411ca2dc247de1beec2ad1a0f7f49d2370971c8c65f95b0d6c14b31e
-
SSDEEP
3072:bFg/OTNG1obNXB45vAEsreszccGiXzU+wtBJPkyzy4H/mqku/DjEWKVQNCDu:u/Ow+x69ftc9XzStBJ8y5mqkYDjv3Gu
Score1/10 -
-
-
Target
gdtadv2.jar
-
Size
420KB
-
MD5
f0ee7f7dd1ef4e5cd436ed6e1c609e5a
-
SHA1
7d112abb7896294b075721b0200f0812ed65a418
-
SHA256
0906bca7332f10d1bdc98b04eb5ad9de2af5da0590b5615aa5f66852b78d9369
-
SHA512
5912538f74fcbe24bba5e3eef2804fd160ccd002bf144e30dd910c9d52d6a3e2dc172a3baa1f6d64ed93346a9b1d4760ae17ec6d1c7c8a4de8cb9264b82bf2be
-
SSDEEP
6144:mQCx8Rp2KiQB/B4Qfdw3Vr/+rwWTLAUq3PwB32k59CruFIBSSAOC8hkIwx:ok/z/BJfdUW8W8ho4k59tSaOCckIS
Score1/10 -