Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
21540224260.zip
-
Size
3.9MB
-
Sample
250228-xls8vsvpv9
-
MD5
421035d50ba07ee6adeb2497ab429e7a
-
SHA1
e84d467f5742fae74ffef2ffaee15dc1beacd448
-
SHA256
700feb6516b2b9070283a3e818abc7c1735e08ca750ff6b522737f2ab3cd77c8
-
SHA512
1f8a76486066fd2e1677dd344fa34c4c2393b31153d64830847cfba21403bb18fa1ce3b1ccb035c1a2fcecd72239fdd55554d5e62a46894f6dfea356952c7a93
-
SSDEEP
98304:yi6Ge9Z6wtemExoJY3GqNdQOXfNKPACGdtjBg6nOtA4:yrGq6wtvExuGGqTX/FtjBRCd
Behavioral task
behavioral1
Sample
83bbbbfd9e2b34c08b6e2d38ec029ccd63b459006e528bb39d196f9681ff310b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
83bbbbfd9e2b34c08b6e2d38ec029ccd63b459006e528bb39d196f9681ff310b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
83bbbbfd9e2b34c08b6e2d38ec029ccd63b459006e528bb39d196f9681ff310b.apk
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral5
Sample
base.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral6
Sample
base.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
83bbbbfd9e2b34c08b6e2d38ec029ccd63b459006e528bb39d196f9681ff310b
-
Size
4.6MB
-
MD5
74cd714c07c8bb391805432d6ef0f6c3
-
SHA1
971c44c24ef8f930ce02c54e43e5bf69b191db72
-
SHA256
83bbbbfd9e2b34c08b6e2d38ec029ccd63b459006e528bb39d196f9681ff310b
-
SHA512
1e32c4dda414736ae1297bfad1be8b64447c24e900d3de28eccf36f23b01e0b569e8a861bdb59365c4c4d24fc289230b9254878cd79e4a52163df4564dfd95e1
-
SSDEEP
98304:k3mUMdkaoLKauoqp87E6dW5U7fQ9KJyJr/wcax7:k3mUEpauoqa7fd7YEUWcax7
Score1/10 -
-
-
Target
base.apk
-
Size
3.5MB
-
MD5
adc5d16499c92152a1b96f97edecf63d
-
SHA1
35f9c75df79fbd36e89e65e99463bccc62988426
-
SHA256
8e5051ee23cb01c25f0adcee6475f4fbd4cff15edaf08c7a81676ced4bfbbd39
-
SHA512
fd57f7d4e43bcb38469980b8b23a1e38122f3634e461cc2b50a187cd7e5e3560e55fa8c2e7f74625ca9bb59730121889b439cc03206126c9334164c5cf36e80b
-
SSDEEP
49152:pgWoVs7LxArmZtZqKD0LSNGUNog3SFI80X6Qpd2x6x8MbsCnJMzvvS9jz0o/nq:I67LxA+DqKD1G2FxNAx6x8vrLYjQt
Score7/10-
Checks known Qemu pipes.
Checks for known pipes used by the Android emulator to communicate with the host.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Reads information about phone network operator.
-