Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790.bin
-
Size
4.2MB
-
Sample
241010-11ln4sygmc
-
MD5
8557a80dc95f26b3d163e42dc2e81a2c
-
SHA1
b6aa0023746d5f55ddd929f8e4382503dd80684e
-
SHA256
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790
-
SHA512
9ea3d2d7bfd18853b44918db938b2dc5cdbb2aa39cb5fde3d77b4f54e5ed3fbd6643f9da0029711d5f42ece0ee57bd3242ba6bd0c712e15aeec2853d208f0eaf
-
SSDEEP
98304:fi6A85DeolhDHHyUZ0dL7wY3RnL6yjiiImSJSJ7lqU5:fvA85BrDHHyU2R7wY3tBA+J7lqU5
Static task
static1
Behavioral task
behavioral1
Sample
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Extracted
hydra
http://tayhodloeces.com
Targets
-
-
Target
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790.bin
-
Size
4.2MB
-
MD5
8557a80dc95f26b3d163e42dc2e81a2c
-
SHA1
b6aa0023746d5f55ddd929f8e4382503dd80684e
-
SHA256
8e8209eb56f3988d82812ccad4188d4e38333d8d4bee6b778101a994dc3c9790
-
SHA512
9ea3d2d7bfd18853b44918db938b2dc5cdbb2aa39cb5fde3d77b4f54e5ed3fbd6643f9da0029711d5f42ece0ee57bd3242ba6bd0c712e15aeec2853d208f0eaf
-
SSDEEP
98304:fi6A85DeolhDHHyUZ0dL7wY3RnL6yjiiImSJSJ7lqU5:fvA85BrDHHyU2R7wY3tBA+J7lqU5
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1