Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.bin
-
Size
4.0MB
-
Sample
250228-18kf1szygz
-
MD5
0fb74af2fa1aa4ee4b7ad0bcd944d78e
-
SHA1
552b5a73ff31cc276fe64cae79beae7e2e3bb1fd
-
SHA256
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8
-
SHA512
13ca1a1667f282879718a90778653e9080d1a39b7fc1a5477a68432f722a10be4a3163110c1e980ab9576528e0bcc45a5d1cb07e751ef0179ddd6f9564a4e65c
-
SSDEEP
49152:5gm5ZaPGRo5N3YeyRZJOzqIQ7TcPAr6pOTPTzUZGoAFbYRVLLw1ZPQJiSxm9TmP9:nw3DHFHpODHjotVEP7im9SeG
Static task
static1
Behavioral task
behavioral1
Sample
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.apk
Resource
android-33-x64-arm64-20240910-en
Malware Config
Extracted
androrat
3.6.98.232:18443
Targets
-
-
Target
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8.bin
-
Size
4.0MB
-
MD5
0fb74af2fa1aa4ee4b7ad0bcd944d78e
-
SHA1
552b5a73ff31cc276fe64cae79beae7e2e3bb1fd
-
SHA256
dde9ac42b901d50f10cd39ef9ebb342b015739eeece0927d840abdafa9d4feb8
-
SHA512
13ca1a1667f282879718a90778653e9080d1a39b7fc1a5477a68432f722a10be4a3163110c1e980ab9576528e0bcc45a5d1cb07e751ef0179ddd6f9564a4e65c
-
SSDEEP
49152:5gm5ZaPGRo5N3YeyRZJOzqIQ7TcPAr6pOTPTzUZGoAFbYRVLLw1ZPQJiSxm9TmP9:nw3DHFHpODHjotVEP7im9SeG
-
Androrat family
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries account information for other applications stored on the device
Application may abuse the framework's APIs to collect account information stored on the device.
-
Reads the contacts stored on the device.
-
Reads the content of the calendar entry data.
-
Reads the content of the call log.
-
Requests cell location
Uses Android APIs to to get current cell location.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Location Tracking
1Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1