Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
129s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
08/02/2025, 14:13
Static task
static1
Behavioral task
behavioral1
Sample
47fd8551845faab87bae897926908a332928535742145ccf218bf2af0ae3439a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
47fd8551845faab87bae897926908a332928535742145ccf218bf2af0ae3439a.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
47fd8551845faab87bae897926908a332928535742145ccf218bf2af0ae3439a.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
1_128275404f.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
1_128275404f.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
47fd8551845faab87bae897926908a332928535742145ccf218bf2af0ae3439a.apk
-
Size
13.0MB
-
MD5
64ced28d55551ae426f2b9b9cce2403c
-
SHA1
76c63e760e2cfa5c9682f1af5e248019319e4c09
-
SHA256
47fd8551845faab87bae897926908a332928535742145ccf218bf2af0ae3439a
-
SHA512
79347a7875144834a071bd848ec3cb3e7e3aa9cc10cfca51ecfea0dfbf00ed8397c435c4b1e49ca28569f2300e04e7f9e000119ef89bd962799c5bd3a358a126
-
SSDEEP
196608:nZbhoymj7XRscUurBQMSRYpZe87JCUdJ6IEiVAeBn1BOjxNji:nZbhOHrR1pZvCuJPvAI10/2
Malware Config
Signatures
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.hello.world/app_dex/classes.dex 5092 com.hello.world /data/user/0/com.hello.world/app_dex/classes.dex 5092 com.hello.world -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.hello.world -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.hello.world -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.hello.world -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.hello.world -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.hello.world
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5e1111c4bf80e0d5ecf0d0100064ad7c1
SHA123c7fb861328b153e4de34f04f017eff8764798c
SHA2569077fb747b5c9e76c2393c70533caef25a0eb5f2a2fa7ceb2dd8554653530aa8
SHA5121e5bab73cc6693637cd2738a1c018ade3770b5511d05b160db94cf3bfc256de9a2d5b67c8217b79ae3e050388e6d2da3f1ff254f3ea5ff81662cb7a6ab28b88b
-
Filesize
399KB
MD518f0241a54947e0b5475c0d676b69c3f
SHA1590a7d8c7b33073681ac3ad4c261623f1991fa50
SHA2560163ca070374c2a32bcb0727b44fe8680e073ff98d68f2c8c9c1695e68f4e995
SHA5129b792ab31ee4605973aeb67909c3ab2f11e8b396d012f97537b952f1a4b5a28ae4a66d4384f5d11b8d99188608219e0b0837891d2a5aed2758e6e60be5e208d1
-
Filesize
399KB
MD5c3362d6ff6e49ff0f252eaeb7a7cfb5e
SHA1ed548e4647294a6739250c62cbd6e88c0bf7d31d
SHA2568a99bd50b9df9db5e3345f0ad020d3a00980cb6c8743bde3c01409075123b3f6
SHA5124f67ae208ec60d6210d4348335995c013759b437adfce18f6d7064d5e7694ffa950dd8fc21aa5e2992e5b4bebd75a20e3157d69866c3a5c3bba12312c740a967