Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.bin

  • Size

    1.2MB

  • Sample

    240812-2al3materq

  • MD5

    dc5b59b765c50454c3668bc2608ffe52

  • SHA1

    5945bcc40840cfad63b1b347c8ed87c81ead4e74

  • SHA256

    bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e

  • SHA512

    ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792

  • SSDEEP

    24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl

Malware Config

Extracted

Family

hook

C2

http://wispy-pine-99659.pktriot.net:22284

AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Targets

    • Target

      bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e.bin

    • Size

      1.2MB

    • MD5

      dc5b59b765c50454c3668bc2608ffe52

    • SHA1

      5945bcc40840cfad63b1b347c8ed87c81ead4e74

    • SHA256

      bce14fcf7b5c141f3d9f5f31b1aa60db0d951a3728b1ed3d9eae995e2574e87e

    • SHA512

      ea2e30b743972f5fb167e8b5d75d28d305871f532362129b5ba58c5f949173821502a186637844aa908c9ada428791d2cdee968a64956c9ff4e9ed4c74665792

    • SSDEEP

      24576:gEs5wSn188ECTBwY16MPIrunOK3KmEFyErgDR4fHklENPl:HK9iCdwY4cp3lEkErgV6CGPl

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.