Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
77s -
max time network
151s -
platform
android_x64 -
resource
android-x64-20231215-en -
resource tags
androidarch:x64arch:x86image:android-x64-20231215-enlocale:en-usos:android-10-x64system -
submitted
27/01/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
1d75f7f5bee9118daad0d3ab6c47d95c3f7905a835e34b17655970926eb08f32.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
1d75f7f5bee9118daad0d3ab6c47d95c3f7905a835e34b17655970926eb08f32.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
1d75f7f5bee9118daad0d3ab6c47d95c3f7905a835e34b17655970926eb08f32.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
1d75f7f5bee9118daad0d3ab6c47d95c3f7905a835e34b17655970926eb08f32.apk
-
Size
1.6MB
-
MD5
f48a97f159b38c4aaa14588c7d8cd833
-
SHA1
aa2b105ecfa79d5f6cc4aeceb5f61ca9f954f0c6
-
SHA256
1d75f7f5bee9118daad0d3ab6c47d95c3f7905a835e34b17655970926eb08f32
-
SHA512
9abc2880eb22b2edb0fd7e97fd576b875c032da4bc70c48002665dd57f5feca69d7a08fe45ba14d7cc16ba6e2b63bf71ab532bc43ab4641d961cb97eff09ddf6
-
SSDEEP
24576:CXmFv32p/5cqXLX1qQqdKg7/Ng4SCo5pIkMg92VV1DX91/6BtcM7Ds5oMNr4EQb4:CY/g/5c2LF2dd/Ngp3sDod7Abfye
Malware Config
Extracted
cerberus
http://51.81.222.225
Signatures
-
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.lounge.rich Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.lounge.rich -
pid Process 5004 com.lounge.rich -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.lounge.rich/app_DynamicOptDex/ddHty.json 5004 com.lounge.rich -
Listens for changes in the sensor environment (might be used to detect emulation) 1 IoCs
description ioc Process Framework API call android.hardware.SensorManager.registerListener com.lounge.rich
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD518293d58e9955325f6345f92b0794a2d
SHA16f14845623657253ba49d0eb6f3593ae314476e6
SHA25660f2f662945a9b55bbd7f8c04f3bef05214004c856dd17ef2fa205a80d940be2
SHA5120ef18267e797dfa421014784821b5f657d042d8ea1dc218ae57a53f79a8898406be72265ac1e0d732cf1e6df5c260d33daeb083bad43480192f64f5810d42dbc
-
Filesize
64KB
MD5a8b2c918125b38343f025cc8058f20de
SHA12c66c2bf950a3320b91f7f4b2ea9bf05b93a0aca
SHA2569581e3fd7943e7c7315c387d968234730b2f6e9e606f88a0beb0bb6e4d0a1e21
SHA512a8f4cb91073f389bef45db7d71c153f37cbad081d3009434e2edd9c580dd3e7e6bc9e9b96eeb0f7cd00df170f24d4bab2b9f480f23f87da77beb1ec16e6b9558
-
Filesize
171B
MD5e563cad328d02eaa106d5d4c0b0baa94
SHA1a93aa0d6d8144fa58866be51cd42fddfdf40b332
SHA256ced12167ebedc88f74b14d120e45a3524f06dd23ed2c3967e2bc9c8d8e39370b
SHA51292d64c54edcba8ac58c0aae8e541cb7d0bcc7ed2b914af6b7ffd61f9146a04cd6df26f0cfc9112b391f9f24342c367c735d596b2ebfe3df1058b5b74bcebb6c8
-
Filesize
124KB
MD5939775621839081f8ceba766d16cdf8c
SHA1ef20dad4f5caf539effdc622e66fab77169c860b
SHA256b9ebfbe35139fc50e90d06c3add1f27d65c772f7d4f8d069584ef3fc2411cbd7
SHA512d6a6fd8ffad0d1a82cb4de3df839ea81435f311fcb28dff4efa5aa1665316c94df5330e22060736612d9d8acc5238487b1e2cba0449c1f046fed38199fdad80e