Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc.bin
-
Size
184KB
-
Sample
240410-1wwzaaff61
-
MD5
f82f541faf44125d7749caa6ce271470
-
SHA1
7c8ac231edfc1432b219cd7c94410908e66446f8
-
SHA256
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc
-
SHA512
d49420e8b74c23dff40dad4506f88353e57b31af4509eb54766b62b5cc814b9ea7eade74fc9fa151430aa775f30cf39cf7d215703b884847c75adb18d95a4850
-
SSDEEP
3072:v5lhQefqu5dTkbdS65S/ecC2HQiINsYNr/FwLmbRULI6JzHBWq:v5l95tZWDIPIZBRch1
Behavioral task
behavioral1
Sample
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
octo
https://shoprise57899321.shop/YmQ5ZDVkMzRkZjE5/
https://emporiumwave245768.shop/YmQ5ZDVkMzRkZjE5/
https://worldfusion891056.shop/YmQ5ZDVkMzRkZjE5/
https://universevibe123459.shop/YmQ5ZDVkMzRkZjE5/
https://emporiumdelight987656.shop/YmQ5ZDVkMzRkZjE5/
https://thopris578993215.shop/YmQ5ZDVkMzRkZjE5/
https://empoiumwave245768.shop/YmQ5ZDVkMzRkZjE5/
https://worfusion891056.shop/YmQ5ZDVkMzRkZjE5/
https://unirsevibe123459.shop/YmQ5ZDVkMzRkZjE5/
https://eoriumdelight987656.shop/YmQ5ZDVkMzRkZjE5/
Targets
-
-
Target
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc.bin
-
Size
184KB
-
MD5
f82f541faf44125d7749caa6ce271470
-
SHA1
7c8ac231edfc1432b219cd7c94410908e66446f8
-
SHA256
7b142300dfad84ccf3e6c615ca6c8857dd0e0cdf4bf042a88b6c16dbb6e92cfc
-
SHA512
d49420e8b74c23dff40dad4506f88353e57b31af4509eb54766b62b5cc814b9ea7eade74fc9fa151430aa775f30cf39cf7d215703b884847c75adb18d95a4850
-
SSDEEP
3072:v5lhQefqu5dTkbdS65S/ecC2HQiINsYNr/FwLmbRULI6JzHBWq:v5l95tZWDIPIZBRch1
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2