Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    c37196d4675cf0740828d2ff35803222f545918fcce9067bf513518d7822b557.bin

  • Size

    2.9MB

  • Sample

    241020-14metavdrn

  • MD5

    1ddf4a7348f0d3a70aec759c57de1248

  • SHA1

    281673404c7ae7526a355feaca354458fc7f3b07

  • SHA256

    c37196d4675cf0740828d2ff35803222f545918fcce9067bf513518d7822b557

  • SHA512

    2fbd4e49c8bddd0a643e7fef45cb8a2434506374315d651c6e19cf9aabcfedfcfbf29afe958ec1fc776ee499b2502ed5230592542da14153e23578dbc73b8d3d

  • SSDEEP

    49152:U++++lXPmZbVeAMTY2fvdAFXuH+ht9Yg8DjngKYTya1JCFHnrNUlO0tHUncfOOX7:U++++lX+5kXfv+F++t9AjnITyiCnrylz

Malware Config

Extracted

Family

ermac

C2

http://91.215.85.37:3434

AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Extracted

Family

hook

C2

http://91.215.85.37:3434

AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Targets

    • Target

      c37196d4675cf0740828d2ff35803222f545918fcce9067bf513518d7822b557.bin

    • Size

      2.9MB

    • MD5

      1ddf4a7348f0d3a70aec759c57de1248

    • SHA1

      281673404c7ae7526a355feaca354458fc7f3b07

    • SHA256

      c37196d4675cf0740828d2ff35803222f545918fcce9067bf513518d7822b557

    • SHA512

      2fbd4e49c8bddd0a643e7fef45cb8a2434506374315d651c6e19cf9aabcfedfcfbf29afe958ec1fc776ee499b2502ed5230592542da14153e23578dbc73b8d3d

    • SSDEEP

      49152:U++++lXPmZbVeAMTY2fvdAFXuH+ht9Yg8DjngKYTya1JCFHnrNUlO0tHUncfOOX7:U++++lX+5kXfv+F++t9AjnITyiCnrylz

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.