Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
154s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
03/03/2025, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
b46619fe854d4f66db90c7da635ed183d8ee509396b4b8eac9feacf5889bcf38.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b46619fe854d4f66db90c7da635ed183d8ee509396b4b8eac9feacf5889bcf38.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b46619fe854d4f66db90c7da635ed183d8ee509396b4b8eac9feacf5889bcf38.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
b46619fe854d4f66db90c7da635ed183d8ee509396b4b8eac9feacf5889bcf38.apk
-
Size
2.6MB
-
MD5
6e4d35425bfc52ea86d0b0b71ea91d54
-
SHA1
8120cb33959a3f394f3b770e5a88b663a47f8ad0
-
SHA256
b46619fe854d4f66db90c7da635ed183d8ee509396b4b8eac9feacf5889bcf38
-
SHA512
52fdb4cc3530bdb30ef10f0f3710b32223c1bfbc8b625f6dbe84e1a9537eb33698701bfb59ef43591381831347a7511e26fe25c06b34015fb817295bbfa7ad11
-
SSDEEP
49152:kTEupy8Cp2RRDKdkxdwz6AqrZLNT81d9nccjziV+RK/GtiTw2Gk:kT7yPbdsdwz6JrZFKd9coziV+s/G8T6k
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_antidot -
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/D0Ezk0MnNcORphV7miLfujOfw63nGKoV.dex 5101 dev.decryptapks.downloader.qwertymods /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/D0Ezk0MnNcORphV7miLfujOfw63nGKoV.dex 5101 dev.decryptapks.downloader.qwertymods -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener dev.decryptapks.downloader.qwertymods -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone dev.decryptapks.downloader.qwertymods -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver dev.decryptapks.downloader.qwertymods -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal dev.decryptapks.downloader.qwertymods -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo dev.decryptapks.downloader.qwertymods -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo dev.decryptapks.downloader.qwertymods
Processes
-
dev.decryptapks.downloader.qwertymods1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:5101
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD54589f70f611f208d125f5218d0efaebe
SHA1e3d1209be603ce04884fba8228a71390958c1db9
SHA2567d081b4f574ff147fc9daf0e20959169bdf57fe0e6005a4483a657261dee6616
SHA512bd7ba483e46e65f24ac7d8657cb02d4541a45ed79a19052fd47f6d9e910189391954232e35ae24c8cf7e198ea1f4f9482903ad868541abd4dbb1788cd36fdfa1
-
Filesize
24B
MD55edc1cc405e5617150fc92569c581536
SHA1868e851442411eb132b4f063c6b3b09679fa6927
SHA25687b4bfaf8a5f7687c570c2bc31ad443f4b0bb178d11cdebdf52624ff3a0565c1
SHA5124a398885c03aaa8643ad28bd5f423a8524c215d8e5cdca19cf971fb14ec9576b475bec1ad1a2e97bc6fbee1783a20dc69bbd0eecba1a675df5289624fa625414