Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.bin

  • Size

    4.0MB

  • Sample

    250228-18kf1szygz

  • MD5

    0fb74af2fa1aa4ee4b7ad0bcd944d78e

  • SHA1

    552b5a73ff31cc276fe64cae79beae7e2e3bb1fd

  • SHA256

    dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8

  • SHA512

    13ca1a1667f282879718a90778653e9080d1a39b7fc1a5477a68432f722a10be4a3163110c1e980ab9576528e0bcc45a5d1cb07e751ef0179ddd6f9564a4e65c

  • SSDEEP

    49152:5gm5ZaPGRo5N3YeyRZJOzqIQ7TcPAr6pOTPTzUZGoAFbYRVLLw1ZPQJiSxm9TmP9:nw3DHFHpODHjotVEP7im9SeG

Malware Config

Extracted

Family

androrat

C2

3.6.98.232:18443

Targets

    • Target

      dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.bin

    • Size

      4.0MB

    • MD5

      0fb74af2fa1aa4ee4b7ad0bcd944d78e

    • SHA1

      552b5a73ff31cc276fe64cae79beae7e2e3bb1fd

    • SHA256

      dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8

    • SHA512

      13ca1a1667f282879718a90778653e9080d1a39b7fc1a5477a68432f722a10be4a3163110c1e980ab9576528e0bcc45a5d1cb07e751ef0179ddd6f9564a4e65c

    • SSDEEP

      49152:5gm5ZaPGRo5N3YeyRZJOzqIQ7TcPAr6pOTPTzUZGoAFbYRVLLw1ZPQJiSxm9TmP9:nw3DHFHpODHjotVEP7im9SeG

    • AndroRAT

      AndroRAT is an open source Android remote administration tool.

    • Androrat family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.