Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

21/10/2024, 05:56

241021-gm124atekm 10

26/07/2024, 10:06

240726-l5fw4a1apm 6

26/07/2024, 09:57

240726-lzfddatgke 6

26/07/2024, 09:52

240726-lweyfaterd 6

26/07/2024, 09:48

240726-lsrg3azekp 6

General

  • Target

    chrome.apk

  • Size

    12.8MB

  • Sample

    241021-gm124atekm

  • MD5

    2d31261264020e4c630dafb101a472dc

  • SHA1

    b1d19008f6d6e138bd0b7207bdb2d30a7b47a8db

  • SHA256

    20c21a0bf466412118a8b79e890e2ce5dd068a9a2d354f43f6b4b7c94ee16509

  • SHA512

    f7e8505c6a3fbfac982571952f54fc08f57d4f853c49268033b4225598a7fd8f3238f56ced69004bf44f65aa1a69ebb79dc5753f0f3257de49fce97757df047e

  • SSDEEP

    196608:oNzbW0tWEeoOFidthSlGoFVfaHmNorOv6/xCWKKV6pPycX/zTa8rSI8Nd:IPuoOQ9yfaH+ortGKwLJW

Malware Config

Extracted

Family

trickmo

C2

http://starnow.cn.com/c

Targets

    • Target

      chrome.apk

    • Size

      12.8MB

    • MD5

      2d31261264020e4c630dafb101a472dc

    • SHA1

      b1d19008f6d6e138bd0b7207bdb2d30a7b47a8db

    • SHA256

      20c21a0bf466412118a8b79e890e2ce5dd068a9a2d354f43f6b4b7c94ee16509

    • SHA512

      f7e8505c6a3fbfac982571952f54fc08f57d4f853c49268033b4225598a7fd8f3238f56ced69004bf44f65aa1a69ebb79dc5753f0f3257de49fce97757df047e

    • SSDEEP

      196608:oNzbW0tWEeoOFidthSlGoFVfaHmNorOv6/xCWKKV6pPycX/zTa8rSI8Nd:IPuoOQ9yfaH+ortGKwLJW

    Score
    7/10
    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Target

      base.apk

    • Size

      7.6MB

    • MD5

      ca99cd533c8f93ab900b9eaa2368b6b0

    • SHA1

      e9dfe27df482d853a8072bacb734bccd05227d35

    • SHA256

      8e8470ed0fd881e9c7ad3db2bcb9515a9dc8fbbcf9fdf38169330514524059ef

    • SHA512

      f1f495744e9cac629412e7e9eb0828f6d1197a84bfa2692a5bf34022f3a754d4a78907fba0ec8cb5b2eda6d03ff17b59ae7d7f93fb6cceed2be87e909885ab4d

    • SSDEEP

      196608:X1H7QE5m9OHWTpCiAIR4dpMy3Vhx+KOs4G:X1H7Qgm9dMICFf

    • TrickMo

      TrickMo is an Android banking trojan with the capability to intercept 2FA codes first seen in September 2019.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the content of SMS inbox messages.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests enabling of the accessibility settings.

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks