Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    20732dfce25ab709289512670ee9e1d9c72a67ff5b4315eaba2dd48c7c5dc322.bin

  • Size

    1.1MB

  • Sample

    250220-13b8fswqer

  • MD5

    e43161a30c12c21d258f43707159fbcc

  • SHA1

    e909a2a265cb9504697faaf25f04bbc96a6190d6

  • SHA256

    20732dfce25ab709289512670ee9e1d9c72a67ff5b4315eaba2dd48c7c5dc322

  • SHA512

    b6b92363131ef008d611eed5d6a878a8bbb6812556af4280508e492edf6c8cbe3442d34c3b4cf1d720742899535b94a954218ffaf7479edbba46be7c2fb46e41

  • SSDEEP

    24576:I1hppab5Aor4poq8r6nnDbri89NCzTojyvyg/3pKL:UhPalH84Wn/NNC3Xvyg/gL

Malware Config

Extracted

Family

hook

C2

http://154.201.71.218

AES_key

Targets

    • Target

      20732dfce25ab709289512670ee9e1d9c72a67ff5b4315eaba2dd48c7c5dc322.bin

    • Size

      1.1MB

    • MD5

      e43161a30c12c21d258f43707159fbcc

    • SHA1

      e909a2a265cb9504697faaf25f04bbc96a6190d6

    • SHA256

      20732dfce25ab709289512670ee9e1d9c72a67ff5b4315eaba2dd48c7c5dc322

    • SHA512

      b6b92363131ef008d611eed5d6a878a8bbb6812556af4280508e492edf6c8cbe3442d34c3b4cf1d720742899535b94a954218ffaf7479edbba46be7c2fb46e41

    • SSDEEP

      24576:I1hppab5Aor4poq8r6nnDbri89NCzTojyvyg/3pKL:UhPalH84Wn/NNC3Xvyg/gL

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Mobile v15

Tasks