Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
6config.arm64_v8a.jar
windows7-x64
1config.arm64_v8a.jar
windows10-2004-x64
1config.en.jar
windows7-x64
1config.en.jar
windows10-2004-x64
1config.mdpi.jar
windows7-x64
1config.mdpi.jar
windows10-2004-x64
1jaineel.vi...or.apk
android-9-x86
8jaineel.vi...or.apk
android-10-x64
8jaineel.vi...or.apk
android-11-x64
8General
-
Target
Video Converter_0.2.41_APKPure.xapk
-
Size
47.2MB
-
Sample
240813-1ry8vaxhnf
-
MD5
2c60a401306ceec01deac1a32af4843f
-
SHA1
2be2305530c393910220eb21dbab64cad0b492f2
-
SHA256
642843e59f7711555a6f7a944149101fcb7b136efc71fab85bc2fd01d4884066
-
SHA512
f6b514fde768e786dfda82b4cb5369a355b7681f518e09fd81ef5d262260c35f7ceac9b1d61c106c545a23b8250fb9a9ddd84fe619b9282c1ab822d282fea274
-
SSDEEP
786432:OdfZFHVEiLe9WMEw6Nh20nmG0pLIK2E4XE4NsgNP+RYVoKWMj6kvd5sECcbNRqcy:Odx7EiaQ7h6fyRTm
Static task
static1
Behavioral task
behavioral1
Sample
config.arm64_v8a.jar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
config.arm64_v8a.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
config.en.jar
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
config.en.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
config.mdpi.jar
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
config.mdpi.jar
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
jaineel.videoconvertor.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
jaineel.videoconvertor.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral9
Sample
jaineel.videoconvertor.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
config.arm64_v8a.apk
-
Size
27.3MB
-
MD5
2afff7ec89892f90a0c24e4328ae1acd
-
SHA1
b0a00b2625ae35f4c34de8ab16a8ea9c3c0c0b0d
-
SHA256
ea45d23e37a97b1858acef05c84bd359996f4d32736bfba949443b30dd18b83b
-
SHA512
a1a8768c455ee33d018c5b5f8a96419187f2759426d75cf91bc5068bfbd3faebe0ee0cad504021bbcffbc4e56df121f96144a51eb824bef878d3a88ad13cce41
-
SSDEEP
786432:E20nmG0pLIK2E4XE4NsgNP+RYVoKWMj6kvd5sECcbNRqc0Of2XwZ/mGhB8c:TfyRTZ
Score1/10 -
-
-
Target
config.en.apk
-
Size
76KB
-
MD5
3d41cae86aed5df6667c8a2e589691b5
-
SHA1
5cb2e54a42ed5be291abfd009c15a9d20a313343
-
SHA256
43d4ed83f09de42f1fa169a920ca4d95f6330c542c148d14fb1a119e554a448e
-
SHA512
4efdd94cb8e31df4d800caadd7c3e1b9ea3ac2881c7a2a9a252cd420d396687f45864a1f9624eb1835afd1cb95bf9d7d466de99ec873f4fce03ef5dbdb9da03a
-
SSDEEP
384:NQAzKHEtalIEAcHJ/uI8KrtshgA/u1y/vqEefqAPA2APOjalbOlRqHOWl6OWlAed:NQALaSGtshgA/u1yXqDqv9dpCzHGEb
Score1/10 -
-
-
Target
config.mdpi.apk
-
Size
155KB
-
MD5
ad77c8267159875b8ab8dac38f4a4498
-
SHA1
c22d9106182c557880c3891789669f4b8bed6fa2
-
SHA256
58a6477fd190b05c435c6fa3680add3d33a9fc2e2c629a69eadbfb65a50dd5d6
-
SHA512
00212bf2a9414609f5af6ae96f0b8295d3474ff5229443175dd5cc6369ced4c7ce393386fabd157279393b0ceb2e9272dc445ffdefc1876fe1035c18823fc4d9
-
SSDEEP
3072:I9HwMEvG3P7wwNGxFaMtZCWZrilLfgql7/ywo3zP5:t43PE1x1ridToDx
Score1/10 -
-
-
Target
jaineel.videoconvertor.apk
-
Size
19.7MB
-
MD5
fc3d2a495a399986dc693775bbbe1e07
-
SHA1
6a34e54b7c233d12712fc397456dfd9d3fbacef6
-
SHA256
32d7eba755e18734fe3cdeedd3197daa428ba51e59d3497e3ace9b3c29b4432c
-
SHA512
1df57b2661b463fc429e494e24a09f5d480af385e1fa17233a85b28d088b686f339244e288529ca21197cd44df389a68a697b01dc2c432b43f02b36aeb083b8e
-
SSDEEP
393216:BZIQwW+aZFHp0iBMBJqHSeLe9W6yjWEw6yAs:BdfZFHVEiLe9WMEw6Ns
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Checks the presence of a debugger
-
Listens for changes in the sensor environment (might be used to detect emulation)
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Virtualization/Sandbox Evasion
2System Checks
2