Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
42s -
platform
android_x64 -
resource
android-33-x64-arm64-20240229-en -
resource tags
androidarch:arm64arch:x64image:android-33-x64-arm64-20240229-enlocale:en-usos:android-13-x64system -
submitted
02/05/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
Batmya.apk
Resource
android-33-x64-arm64-20240229-en
General
-
Target
Batmya.apk
-
Size
3.5MB
-
MD5
c26cff35328a14d87c8373ec59a98cc4
-
SHA1
42d38657f1171b173ce77751c2c6c3a630333f71
-
SHA256
ae5daed5fa6ac5a5a21e5fe003ebd5d9c2fa98053ed75811ee343a3b9c9e08af
-
SHA512
99419d900b5de969d92741e31d08f461e3f3580eacba606ca4026e2ff8f9fb31ede14cae4a1eb53d08c57fba7d1e3b7e55a436d28b03cc431f8d0f469c8d1dff
-
SSDEEP
98304:YkSQRMMe0efC2QU8kgl5u+AflRLcD/yGUo:YkRMMItsY9li6o
Malware Config
Signatures
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/cpuinfo appinventor.ai_omnadange.Batmya -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
description ioc Process File opened for read /proc/meminfo appinventor.ai_omnadange.Batmya -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener appinventor.ai_omnadange.Batmya