Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393.bin

  • Size

    2.9MB

  • Sample

    250209-1yw23avmfv

  • MD5

    65c9c0780a66a5145ec40e650eeff457

  • SHA1

    459f4af59a66b085f004b2307645c8e6310da972

  • SHA256

    a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393

  • SHA512

    c9db220c2688dfd161df029dde5608baad8e663c253c48762ce37455b4abd8e17f67db7db3d9fd9fa988bf5e759e01a00acfbfd5698fa78e6fbba396849e3a9e

  • SSDEEP

    49152:THyu7IEG81t/vk1CG254cM86RpQsv+/hx1SpgLyZ6EQM8XANkT+lzI6HpHGb4dUG:mpEG8jvZL5DM8Cp9+JOguZ6Eh36+ZI6p

Malware Config

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

rc4.plain

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

https://hgfghjgf435gghjeerg43567nvz78845rt4.com/NTA4MzIxMjdkYzNj/

https://6tythgfghjgf435g675656nv354yrt54y545.com/NTA4MzIxMjdkYzNj/

https://65regfghjgf4rt345er35gnvt545yrt4345.com/NTA4MzIxMjdkYzNj/

https://634557hgfghjgf43ytjt3585gnvzv54rt5t345.com/NTA4MzIxMjdkYzNj/

AES_key

Targets

    • Target

      a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393.bin

    • Size

      2.9MB

    • MD5

      65c9c0780a66a5145ec40e650eeff457

    • SHA1

      459f4af59a66b085f004b2307645c8e6310da972

    • SHA256

      a124e759774105e8ace189aa7a538f414d40e51b45b964e56602b9b5a4c03393

    • SHA512

      c9db220c2688dfd161df029dde5608baad8e663c253c48762ce37455b4abd8e17f67db7db3d9fd9fa988bf5e759e01a00acfbfd5698fa78e6fbba396849e3a9e

    • SSDEEP

      49152:THyu7IEG81t/vk1CG254cM86RpQsv+/hx1SpgLyZ6EQM8XANkT+lzI6HpHGb4dUG:mpEG8jvZL5DM8Cp9+JOguZ6Eh36+ZI6p

    • Octo

      Octo is a banking malware with remote access capabilities first seen in April 2022.

    • Octo family

    • Octo payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Requests accessing notifications (often used to intercept notifications before users become aware).

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests modifying system settings.

MITRE ATT&CK Mobile v15

Tasks