Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/02/2025, 12:36
250222-ptcxvawqhl 1Analysis
-
max time kernel
931s -
max time network
943s -
platform
android_x64 -
resource
android-x64-arm64-20240624-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240624-enlocale:en-usos:android-11-x64system -
submitted
22/02/2025, 13:25
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://youtubevanced.com/
Resource
android-x64-arm64-20240624-en
General
-
Target
https://youtubevanced.com/
Malware Config
Signatures
-
888RAT
888RAT is an Android remote administration tool.
-
888Rat family
-
Android 888 RAT payload 1 IoCs
resource yara_rule behavioral1/files/fstream-5.dat family_888rat -
Declares broadcast receivers with permission to handle system events 1 IoCs
description ioc Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN -
Declares services with permission to bind to the system 1 IoCs
description ioc Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 167 portmap.io 169 portmap.io 170 portmap.io 171 portmap.io 175 portmap.io 176 portmap.io 92 mediafire.com 164 portmap.io -
Requests dangerous framework permissions 18 IoCs
description ioc Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE Allows an application to read the user's contacts data. android.permission.READ_CONTACTS Allows an application to read SMS messages. android.permission.READ_SMS Allows an application to send SMS messages. android.permission.SEND_SMS Allows an application to read from external storage. android.permission.READ_EXTERNAL_STORAGE Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE Allows an application to read the user's call log. android.permission.READ_CALL_LOG Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE Allows an application to record audio. android.permission.RECORD_AUDIO Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION Allows an app to access location in the background. android.permission.ACCESS_BACKGROUND_LOCATION Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS Allows access to the list of accounts in the Accounts Service. android.permission.GET_ACCOUNTS Required to be able to access the camera device. android.permission.CAMERA Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW -
Checks CPU information 2 TTPs 5 IoCs
description ioc Process File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome File opened for read /proc/cpuinfo com.android.chrome -
Checks memory information 2 TTPs 5 IoCs
description ioc Process File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome File opened for read /proc/meminfo com.android.chrome
Processes
-
com.android.chrome1⤵
- Checks CPU information
- Checks memory information
PID:4243
-
com.android.chrome1⤵
- Checks CPU information
- Checks memory information
PID:5600
-
com.android.chrome1⤵
- Checks CPU information
- Checks memory information
PID:7034
-
com.android.chrome1⤵
- Checks CPU information
- Checks memory information
PID:7257
-
com.android.chrome1⤵
- Checks CPU information
- Checks memory information
PID:7974
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56B
MD5cecb649cb1fb79c3736936fcbef3bbf2
SHA12c95183d7d2b0cd68d15b3c4115189351fc08720
SHA25609bda72e7c32a69e3268e0ebd8caa33684cbc954dd00c7d93a38830e348ef324
SHA512b8aca3cf0ea838093bd29b70ead608597260b0e35886d491d17c304878f99510fd885d96a191080acb5b706a642253bd9cbe5065ff234472b048fcce282061de
-
Filesize
70KB
MD54d74c17449e01a5c1fd46f45d8981e70
SHA1f3e68fb2f54c9a4df7c04add09f33b0e9b6f86da
SHA256fbbc412711de7251404cef18eeb79c24996e79bdd6cb898002166b0076fb197e
SHA512171eea1b83f61270473fcf41dc2e324ef3633f1590fe4160e6f6d060b0e45ac3562de6be354f4d6b61cfb12d8a80566c54017c151cb0a7bb2e92ea97dcb15fbc
-
Filesize
1.9MB
MD5113bf9a690e87995f9096604cc5dae93
SHA15e29a840ea633a3ff32a8bcc522aecd8ce03ca0d
SHA256d701f8e812f1ce493fd0befed6fb63cebcf1284966e0c861afd5cb1c6e6085e4
SHA512366d483e1dfbabf7b99499732442931bf502dfaa3e86666d752573f4749f0a0d88ddbc61ff6303552b65dd11d8bf82d54e743e31e7668217b9f6eb8f8c925387
-
Filesize
512KB
MD559071590099d21dd439896592338bf95
SHA16a521e1d2a632c26e53b83d2cc4b0edecfc1e68c
SHA25607854d2fef297a06ba81685e660c332de36d5d18d546927d30daad6d7fda1541
SHA512eedb6cadbceb2c991fc6f68dccb80463b3f660c5358acd7d705398ae2e3df2b4327f0f6c6746486848bd2992b379776483a98063ae96edb45877bb0314874668
-
Filesize
2.4MB
MD5f3f4f3e913e3790cd49feef9f96a3960
SHA1713f74b8a475d8424db4f382c28fa076c59c8924
SHA25682eeee5a9e0b5d5951e62e87869bd29eda78e1ce0555479d10e994d2826b5606
SHA51236aa8d2dfc4cf924c0fddb7adfe0c3c9afc597261fb8d3643c24876cf34874e6b3165d60067047baafc4f5f7d79148864b859b884c952342764fc4450ea98ac5