General

  • Target

    Trojan.zip

  • Size

    34.8MB

  • MD5

    bab38d1cdbf56464fc4fec495bae112a

  • SHA1

    551f0bea4ed32eeaf4e468c72435d847647b5010

  • SHA256

    a33b596a570e3ec4cf29dddb37e72adf57499e294c9c873c76429d18b1bc4427

  • SHA512

    05fa5518f1bd0e6f94401df715969a5720a86dff76d3fc7e1763d512ff1978759baf977c4e81703c3d80192f74f5f537d5d29d918f4ed558de5b16841fc06ef8

  • SSDEEP

    786432:HEtAHLbN8/liJBf07nED1doAsM9iUtDLBUkTgt5OGSXXjmeWt3kLli/N:ktXsunERdoq9iquuSRkhiV

Score
10/10

Malware Config

Signatures

  • Wipelock Android payload 2 IoCs
  • Wipelock family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 2 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 9 IoCs

    Checks for missing Authenticode signature.

Files

  • Trojan.zip
    .zip
  • Trojan/BlueScreen.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • out.upx
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • Trojan/Bolbi.vbs
    .vbs
  • Trojan/BonziKill.txt
  • Trojan/Carewmr.vbs
    .vbs
  • Trojan/DudleyTrojan.bat
  • Trojan/Frankenstein.doc
    .docx .doc office2007
  • Trojan/Grave.apk
    .apk android

    sec.blackhole.grave

    Basic


  • Trojan/L0Lz.bat
    .bat .vbs
  • Trojan/Malum.apk
    .apk android arch:arm

    sec.blackhole.malum

    com.smartphoneremote.androidscriptfree.AndroidScriptFree


  • Trojan/Mist/MistInfected_newest.exe
    .exe windows:5 windows x86 arch:x86

    f16f2f4b135561f684f02752de19ea33


    Headers

    Imports

    Sections

  • Trojan/Mist/MistInstaller.exe
    .exe windows:5 windows x86 arch:x86

    2e66f0419297ddafdf3c94b316590cf3


    Headers

    Imports

    Sections

  • Trojan/Mist/MistInstallerRC.exe
    .exe windows:5 windows x86 arch:x86

    2e66f0419297ddafdf3c94b316590cf3


    Headers

    Imports

    Sections

  • Trojan/Mobile_Legends_Adventure.apk
    .apk android arch:arm

    com.moonton.mobilehero

    com.smartphoneremote.androidscriptfree.AndroidScriptFree


  • Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
    .exe windows:4 windows x86 arch:x86

    d7ee0bec939bda9b20c9cb9dcb985e30


    Headers

    Imports

    Sections

  • Trojan/MrsMajors/MrsMajor2.0.7z
    .7z
  • MrsMajor2.0.exe
    .exe windows:4 windows x86 arch:x86

    d7ee0bec939bda9b20c9cb9dcb985e30


    Headers

    Imports

    Sections

  • Trojan/MrsMajors/MrsMajor3.0.exe
    .exe windows:4 windows x64 arch:x64

    167fe7dad034e11847397d501baf6f5e


    Headers

    Imports

    Sections

  • Trojan/Offiz.js
    .html .js polyglot
  • Trojan/Spark/NETFramework.exe
    .exe windows:5 windows x86 arch:x86

    9b2f6a441f9ff8df98ae6e9e6b5d4271


    Code Sign

    Headers

    Imports

    Exports

    Sections

  • Trojan/Spark/Spark.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Trojan/WindowsXPHorrorEdition.txt
  • Trojan/XCSSETMacMalware/TrojanSpy.MacOS.XCSSET.A.6614978ab256f922d7b6dbd7cc15c6136819f4bcfb5a0fead480561f0df54ca6
    .macho macos arch:x64
  • Trojan/XCSSETMacMalware/TrojanSpy.MacOS.XCSSET.A.6fa938770e83ef2e177e8adf4a2ea3d2d5b26107c30f9d85c3d1a557db2aed41
    .scpt macos
  • Trojan/XCSSETMacMalware/TrojanSpy.MacOS.XCSSET.A.ac3467a04eeb552d92651af1187bdc795100ea77a7a1ac755b4681c654b54692
    .macho macos arch:x64
  • Trojan/XCSSETMacMalware/TrojanSpy.MacOS.XCSSET.A.d11a549e6bc913c78673f4e142e577f372311404766be8a3153792de9f00f6c1
    .macho macos arch:x64
  • Trojan/elite.apk
    .apk android

    com.elite

    com.elite.MainActivity


  • Trojan/mobelejen.apk
    .apk android

    com.elite

    com.elite.MainActivity


  • Trojan/vi4a.apk
    .apk android

    com.google.android.virus

    VirusActivity