Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
131s -
platform
android_x64 -
resource
android-x64-20240603-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240603-enlocale:en-usos:android-10-x64system -
submitted
08/06/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x86-arm-20240603-en
Behavioral task
behavioral2
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x64-20240603-en
Behavioral task
behavioral3
Sample
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
Resource
android-x64-arm64-20240603-en
General
-
Target
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8.apk
-
Size
2.0MB
-
MD5
71f6cdb3d8eebe1c8e7e26896238e571
-
SHA1
019134386a6d900d61285e5e986249928a9504b6
-
SHA256
e4d7484b888deceefeb17ee346821a0c9d3112dffd5ad57c71f4df7d304580b8
-
SHA512
740e8bcde7462b99972ea472ee0cae53f4f61fcdc6d9ca1c8c44d0661323178c891f7fe82052cd7bae7239d7a953a6dcdb5e6fc42b28cd4acc9e1634e284228b
-
SSDEEP
49152:I8FjWz5Kzip37zl3fg1S1RvyzHth1mFI1/3Go1eiUMG1VummJwga8TGi3U/kX1l5:IIhup37zlviS1GHoFW3aiUM6ummJwgaE
Malware Config
Signatures
-
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener pl.spyone.agent2 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone pl.spyone.agent2 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver pl.spyone.agent2 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo pl.spyone.agent2 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo pl.spyone.agent2
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dd46d6cae176055d8617ceb3d40f1d96
SHA1b7a971b5f755f7fd5f9041bb1a0ffb1a74d9dd57
SHA256c4d2fc19a3c54c2d2cadde804546ce6f62f960865b829ea240026e1ea2706e96
SHA51254d353f7e746aa3935848cc2f694cd6cfbd1c59b6f56e276b76fad0f0a4c8ea09cd4835be8a8ccd615a7714d3e212a091d93a2b3b835f4ea767c8ba5950a5516
-
Filesize
512B
MD5ef66633d9022ca940d0424098c176041
SHA134e124ed33670c44dd0fe34c1819c374e7895ead
SHA256774bdf37211824683bd85e1fd30256a362682ee7a6d68637e9df0545b02d6730
SHA512f803bd1fa12b622609a3033d53689913369f72c5b4bb4f1d91a9d8b3148a6e8b3b876ff6cd9fc3e4896bf67443e439bc7e0be6bcc746a4bb3d8f949ba04dd738
-
Filesize
8KB
MD5536a3be5f2f5b22b3528e710209e0f97
SHA1011f1bf3d7416bd6c07f76f481424eb24b2dab44
SHA256b5f965b689c3963ba0f6b38cdca174a87e3c0c3f8dfbc7f878aa6b97b8256cb3
SHA51203e52d3932af7c4d16b56221e2e94d2b184a97e28260753b295298889808554ffa53c0e5d2fc2c682c8f88828313a9a0072396975ebf7bcc2823faaa014d7926
-
Filesize
8KB
MD578de04cd62de4e4b8e8c27ac23372227
SHA181497ee2593d2edd9e378f127ae7c1642630f3f1
SHA25607d2b906c7e731732ad94104bacf4777b4c681654608d4976e9efcf34b51f79d
SHA512a8b4a596fedbe20437d864cd4fefc5c4fb67ad9835e05442dbc2c9eedef82d72ecaf1f24e3b800069fb2d7316dad1499ed829381f413ba6bf2c75a0268c885d0