Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
6368bbfc055...ea.apk
android-9-x86
7__pasys_re...er.apk
android-9-x86
__pasys_re...er.apk
android-10-x64
__pasys_re...er.apk
android-11-x64
gdtadv2.apk
android-9-x86
gdtadv2.apk
android-10-x64
gdtadv2.apk
android-11-x64
libs.apk
android-9-x86
libs.apk
android-10-x64
libs.apk
android-11-x64
Analysis
-
max time kernel
2862210s -
max time network
135s -
platform
android_x86 -
resource
android-x86-arm-20231215-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231215-enlocale:en-usos:android-9-x86system -
submitted
23/12/2023, 14:55
Static task
static1
Behavioral task
behavioral1
Sample
368bbfc055a5850a3fcecf6fb2e0b71705dc0f12cbb6927e64069bd4cd030cea.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
__pasys_remote_banner.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral3
Sample
__pasys_remote_banner.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral4
Sample
__pasys_remote_banner.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral5
Sample
gdtadv2.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral6
Sample
gdtadv2.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral7
Sample
gdtadv2.apk
Resource
android-x64-arm64-20231215-en
Behavioral task
behavioral8
Sample
libs.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral9
Sample
libs.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral10
Sample
libs.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
368bbfc055a5850a3fcecf6fb2e0b71705dc0f12cbb6927e64069bd4cd030cea.apk
-
Size
22.6MB
-
MD5
ff1e454e37b01d6a0241076a82b4005e
-
SHA1
83adcc966873b3017837268eb8e75b933702c6b2
-
SHA256
368bbfc055a5850a3fcecf6fb2e0b71705dc0f12cbb6927e64069bd4cd030cea
-
SHA512
fc04da914f3e9e2b5978945959255c1f978600cb4c427cedb6af3525698d51e2caa95cce436d71d495c98efb03625c3b94ab8274cdfa88e504e23ab5342d9b6f
-
SSDEEP
393216:Lm1XhBg2VdN0Uz7/+cUBjmDVXhbNU7/ZAuZ93IJD0vL0Vv:S1XhB3VdNHHbUBjmZXhBYiuHYBgOv
Malware Config
Signatures
-
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.youku.youkuvip/app_dex/libs.apk 4281 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.youku.youkuvip/app_dex/libs.apk --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.youku.youkuvip/app_dex/oat/x86/libs.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.youku.youkuvip/app_dex/libs.apk 4256 com.youku.youkuvip -
Reads information about phone network operator.
-
Uses Crypto APIs (Might try to encrypt user data) 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.youku.youkuvip
Processes
-
com.youku.youkuvip1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4256 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.youku.youkuvip/app_dex/libs.apk --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.youku.youkuvip/app_dex/oat/x86/libs.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4281
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
575KB
MD517fae015842aec08781049e12499a6df
SHA150176f4c7fd9e90094333ca389f4abf89d1add56
SHA256968f9469f536da81a755fab3f28d98453a21e578e9282eb5dc77280a2302e4ab
SHA512c0e7a00bde1c731efca6d72bcae49dc83d2595ebf04c3aef41ad5bf69b0b8cf4db0b687294ccb4985a898c03e9ce6d2e051b111bab6b4e7644594db5a5a36f26
-
Filesize
1.9MB
MD516fc09bdac8691615af7102a3f7545e0
SHA171ff3910a6a1f37fead59d51af8d3f3443e9cbe0
SHA256bc3317c250c750bf7f7a1f3871289b5257a925ed409c89b2b437cb7946f477a5
SHA512229267057aa4f54396d505d56f97239fdd42d69f7d230476ecc00cfe2fa6a9de90e8419313c7f0f73b97e6f8d5310e9c394f807b7499a1ece189f73f17e74925
-
Filesize
1.9MB
MD5ae6aad24ca9215427afddf30188bb47c
SHA170a62ded6ed11e0ea9242c844b3db764bdcb81a8
SHA256eb5085fa6f611357099618d186d95391887241bf09367221fd215e3c92e31f7a
SHA5122ea365cd4ab82ceb16a2a2f007c1dc9738cf2d810ceaf6331c638dfcfff0cb80fbd08950e84ddfd9fd0e4446e8d7f1cb3d4bd5c7222ec75d3fe1e6ea536bfdab
-
Filesize
48B
MD51e56c963b36dd44117f53fe929523096
SHA1c43f3a5a166d872e0346e407d18a028727d9b667
SHA2568e2479552000f72b6ffa6845f274b1c9b7663e23bb182d76cf29beaa8bb21fd9
SHA512e8d4eaeecf00b24867037e4dd661bf6f50da90180de598b266d11bff72be7bca29dcd2579d08ddd49b638cc3e40108d1fea33888c9681f5661abe507c6634109