Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
385s -
max time network
394s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
13/08/2024, 19:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://deltaexploits.net
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
http://deltaexploits.net
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
http://deltaexploits.net
Resource
android-x64-arm64-20240624-en
General
-
Target
http://deltaexploits.net
Malware Config
Signatures
-
Requests dangerous framework permissions 5 IoCs
description ioc Allows an app to post notifications. android.permission.POST_NOTIFICATIONS Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE -
Checks CPU information 2 TTPs 3 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 3 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
337KB
MD54f7aad6e524c2aee1d18c141c00d335a
SHA1961c5ee3235f6cd6d72e0c33a49b308353894566
SHA2569d96643e742cd1592668f4f6ee2d5e40e7ed2925fe7363998a921299d777c3c1
SHA5120bc9da5caed76d4dd793f624114ec5d42991544332a8808b0086313688b963314026c2ece35a59c4d08d7bb28b4e0082196e4b78be98f6602d2aab1015c55931
-
Filesize
44KB
MD5af91255405eed132c9cdf67ac4dbb98d
SHA1dbdc5e5e676f04d63fad2abb09fb43e816aa6201
SHA256c08ebaf1fe85045350a12369291348444ea40ff74f097b7d97e422e70e1dc992
SHA512cffde22c9e8c3a1b06369a097a3fd6905e69ee4f7c7d0c503b2e875216072f0978b970916ec95d77f2684e49fc5414d352bd208b0c45f8070713fc7a22063391
-
Filesize
172.3MB
MD53b9b3b4a97446311ef61544d70e51bc5
SHA1d9e440393e937d752c340633e3fafe40308d4473
SHA25670e2a4c9c98422cb7be18b6006ede9c3a0fcee108b48a1c15505104a27c073ed
SHA5122b492edac912859b7b190010b575916f864bedfd25f182f28fc5ac2b966bd14f533ce1b5827693f613ea436208c8039f896d3300a0807544ec1bbdc5a9fe5297
-
Filesize
544KB
MD5ddc53672984b8d19ed46da80b3c3c861
SHA133c5b44f097ac704cc1238d58e406f45a574b240
SHA256ecc4387f2eb20d77aefb5f9a8112d8dbe28343ee7ddcb824ddfdc0d38b9ea41d
SHA51234888bd7816afc0b5a58b0efea1ec3780cb8ab1455bf1f33f37f3b949d67d7ac5bcfae0cd7d8d336b5e9a34a833df06d2785b515447a5b71e71cd160b926e12e