Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed.bin
-
Size
5.0MB
-
Sample
250302-1x9lrswr13
-
MD5
355bc169ce558d9c5ddf2e192e002c8b
-
SHA1
15ffba7b0c956c86608cc335712b1d568c7da159
-
SHA256
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed
-
SHA512
bf4694b368908a65d8fa751584ef2cf5c854caf627baa54a37877aeaa8d61d22aa6cc7b9cb02c9df00b4e0aaf5ab50d75981d9dbd3745e1142aa6c2af4b8a3fd
-
SSDEEP
98304:X25fdW7wo7fq3yyJd3FEy+/CQeVavSYYEDZmqLSgPQC/ijhFwo:myV7fSJxUBeV0SWZTP7sFwo
Static task
static1
Behavioral task
behavioral1
Sample
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
hydra
http://45.83.20.56
Targets
-
-
Target
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed.bin
-
Size
5.0MB
-
MD5
355bc169ce558d9c5ddf2e192e002c8b
-
SHA1
15ffba7b0c956c86608cc335712b1d568c7da159
-
SHA256
5d6ab41098430b0f2079cd0bf715a7d59eacfbda9f743e25dacd6037f79ef0ed
-
SHA512
bf4694b368908a65d8fa751584ef2cf5c854caf627baa54a37877aeaa8d61d22aa6cc7b9cb02c9df00b4e0aaf5ab50d75981d9dbd3745e1142aa6c2af4b8a3fd
-
SSDEEP
98304:X25fdW7wo7fq3yyJd3FEy+/CQeVavSYYEDZmqLSgPQC/ijhFwo:myV7fSJxUBeV0SWZTP7sFwo
-
Hydra family
-
Hydra payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Reads the contacts stored on the device.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Impair Defenses
1Prevent Application Removal
1Input Injection
1