Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    ab71f92c8db193aa8ffe8991c55dcae492c172766015ea73faa2c5faa75aaec5.bin

  • Size

    4.1MB

  • Sample

    250116-11xrdaskgj

  • MD5

    6f128a4c892ab81fe4fae4f61a8c6134

  • SHA1

    521ca97420f0edf00e07da94fee36fa1f8c72d6a

  • SHA256

    ab71f92c8db193aa8ffe8991c55dcae492c172766015ea73faa2c5faa75aaec5

  • SHA512

    032f11e2e4c4ebd86c2532eaeaad71de7a0d17d9277fa0f39011c88ce2b19bc712bf22c7640b9394455e1400af1b4dfe82703c37b472d00e15b07176f2fea220

  • SSDEEP

    98304:9Dkcut1pedKTRiBKgBP0oeeVOTcFQ9V3NGs1x:9Y1pqOiY0coZVocFQ9V3NGs/

Malware Config

Extracted

Family

androrat

C2

3.6.98.232:18443

Targets

    • Target

      ab71f92c8db193aa8ffe8991c55dcae492c172766015ea73faa2c5faa75aaec5.bin

    • Size

      4.1MB

    • MD5

      6f128a4c892ab81fe4fae4f61a8c6134

    • SHA1

      521ca97420f0edf00e07da94fee36fa1f8c72d6a

    • SHA256

      ab71f92c8db193aa8ffe8991c55dcae492c172766015ea73faa2c5faa75aaec5

    • SHA512

      032f11e2e4c4ebd86c2532eaeaad71de7a0d17d9277fa0f39011c88ce2b19bc712bf22c7640b9394455e1400af1b4dfe82703c37b472d00e15b07176f2fea220

    • SSDEEP

      98304:9Dkcut1pedKTRiBKgBP0oeeVOTcFQ9V3NGs1x:9Y1pqOiY0coZVocFQ9V3NGs/

    • AndroRAT

      AndroRAT is an open source Android remote administration tool.

    • Androrat family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks