Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ANDROID_RAT.rar
windows7-x64
3ANDROID_RAT.rar
windows10-2004-x64
3ANDROID RA... 1.exe
windows7-x64
7ANDROID RA... 1.exe
windows10-2004-x64
7Creal.pyc
windows7-x64
3Creal.pyc
windows10-2004-x64
3ANDROID RA...er.exe
windows7-x64
7ANDROID RA...er.exe
windows10-2004-x64
7Creal.pyc
windows7-x64
3Creal.pyc
windows10-2004-x64
3ANDROID RA...me.txt
windows7-x64
1ANDROID RA...me.txt
windows10-2004-x64
1ANDROID RA...st.bat
windows7-x64
1ANDROID RA...st.bat
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 07:53 UTC
Behavioral task
behavioral1
Sample
ANDROID_RAT.rar
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ANDROID_RAT.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
ANDROID RAT/Build 1.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
ANDROID RAT/Build 1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Creal.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Creal.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
ANDROID RAT/Compiler.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
ANDROID RAT/Compiler.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Creal.pyc
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Creal.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
ANDROID RAT/Readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
ANDROID RAT/Readme.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
ANDROID RAT/Run first.bat
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
ANDROID RAT/Run first.bat
Resource
win10v2004-20240709-en
General
-
Target
ANDROID_RAT.rar
-
Size
15.8MB
-
MD5
f121b24292ab6b5c0fdc6f165f7e869d
-
SHA1
f5a34d026d56262ddf99b8099706d0c774b3cfb7
-
SHA256
8a78fdf56fe352e39b804faa5f544db35694ea6d0d46297d52bb66986604ab15
-
SHA512
954647af0d46b744073e642e84b91440e864c2e185ce7a1455360dc3d0065066fe9a99fe13684ad45658e871aa0ff485c43488b94c0b2d5bf4e6de97e172bd36
-
SSDEEP
393216:JKSn4hsYBCxVv2A6VbjSKgtB2WFVCHKSn4hsYBCxVv2A6VbjSKgtB2WFVCZ:JX+sYcVvf6VjSltxCHX+sYcVvf6VjSlQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5008 OpenWith.exe
Processes
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request68.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request26.35.223.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.126.166.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
68.159.190.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
26.35.223.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
56.126.166.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
29.243.111.52.in-addr.arpa