Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Video Converter_0.2.41_APKPure.xapk

  • Size

    47.2MB

  • Sample

    240813-1ry8vaxhnf

  • MD5

    2c60a401306ceec01deac1a32af4843f

  • SHA1

    2be2305530c393910220eb21dbab64cad0b492f2

  • SHA256

    642843e59f7711555a6f7a944149101fcb7b136efc71fab85bc2fd01d4884066

  • SHA512

    f6b514fde768e786dfda82b4cb5369a355b7681f518e09fd81ef5d262260c35f7ceac9b1d61c106c545a23b8250fb9a9ddd84fe619b9282c1ab822d282fea274

  • SSDEEP

    786432:OdfZFHVEiLe9WMEw6Nh20nmG0pLIK2E4XE4NsgNP+RYVoKWMj6kvd5sECcbNRqcy:Odx7EiaQ7h6fyRTm

Malware Config

Targets

    • Target

      config.arm64_v8a.apk

    • Size

      27.3MB

    • MD5

      2afff7ec89892f90a0c24e4328ae1acd

    • SHA1

      b0a00b2625ae35f4c34de8ab16a8ea9c3c0c0b0d

    • SHA256

      ea45d23e37a97b1858acef05c84bd359996f4d32736bfba949443b30dd18b83b

    • SHA512

      a1a8768c455ee33d018c5b5f8a96419187f2759426d75cf91bc5068bfbd3faebe0ee0cad504021bbcffbc4e56df121f96144a51eb824bef878d3a88ad13cce41

    • SSDEEP

      786432:E20nmG0pLIK2E4XE4NsgNP+RYVoKWMj6kvd5sECcbNRqc0Of2XwZ/mGhB8c:TfyRTZ

    Score
    1/10
    • Target

      config.en.apk

    • Size

      76KB

    • MD5

      3d41cae86aed5df6667c8a2e589691b5

    • SHA1

      5cb2e54a42ed5be291abfd009c15a9d20a313343

    • SHA256

      43d4ed83f09de42f1fa169a920ca4d95f6330c542c148d14fb1a119e554a448e

    • SHA512

      4efdd94cb8e31df4d800caadd7c3e1b9ea3ac2881c7a2a9a252cd420d396687f45864a1f9624eb1835afd1cb95bf9d7d466de99ec873f4fce03ef5dbdb9da03a

    • SSDEEP

      384:NQAzKHEtalIEAcHJ/uI8KrtshgA/u1y/vqEefqAPA2APOjalbOlRqHOWl6OWlAed:NQALaSGtshgA/u1yXqDqv9dpCzHGEb

    Score
    1/10
    • Target

      config.mdpi.apk

    • Size

      155KB

    • MD5

      ad77c8267159875b8ab8dac38f4a4498

    • SHA1

      c22d9106182c557880c3891789669f4b8bed6fa2

    • SHA256

      58a6477fd190b05c435c6fa3680add3d33a9fc2e2c629a69eadbfb65a50dd5d6

    • SHA512

      00212bf2a9414609f5af6ae96f0b8295d3474ff5229443175dd5cc6369ced4c7ce393386fabd157279393b0ceb2e9272dc445ffdefc1876fe1035c18823fc4d9

    • SSDEEP

      3072:I9HwMEvG3P7wwNGxFaMtZCWZrilLfgql7/ywo3zP5:t43PE1x1ridToDx

    Score
    1/10
    • Target

      jaineel.videoconvertor.apk

    • Size

      19.7MB

    • MD5

      fc3d2a495a399986dc693775bbbe1e07

    • SHA1

      6a34e54b7c233d12712fc397456dfd9d3fbacef6

    • SHA256

      32d7eba755e18734fe3cdeedd3197daa428ba51e59d3497e3ace9b3c29b4432c

    • SHA512

      1df57b2661b463fc429e494e24a09f5d480af385e1fa17233a85b28d088b686f339244e288529ca21197cd44df389a68a697b01dc2c432b43f02b36aeb083b8e

    • SSDEEP

      393216:BZIQwW+aZFHp0iBMBJqHSeLe9W6yjWEw6yAs:BdfZFHVEiLe9WMEw6Ns

    • Checks if the Android device is rooted.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Checks the presence of a debugger

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks