Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    782628fb2d316667fe65903efe6d4e9afdc7dbcafa0d5bf33203e0f6fcc40642.bin

  • Size

    4.5MB

  • Sample

    250306-12k4zazjw6

  • MD5

    d879ff85d5ce1b13f7deb565afb88588

  • SHA1

    6567693fd429aacaf2323f8a5862ca9ee7455312

  • SHA256

    782628fb2d316667fe65903efe6d4e9afdc7dbcafa0d5bf33203e0f6fcc40642

  • SHA512

    cce8ba50eb388330b34455ec1840c38d8fee998c869d8a99aab438780d22c110fb88d36a4a5d1fc74882b890e26533ee5e0e3ed4bd1b990ea37a62686661f962

  • SSDEEP

    98304:TSueyeMMn6GSdWJtU5HV7LrJ/OvwWKtD6LNaBJvPbMNixCivmjFOOWrb:e7pMMnx0WJtYdXcTKR2WlQjo

Malware Config

Extracted

Family

ermac

C2

http://185.172.128.82

AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Extracted

Family

hook

C2

http://185.172.128.82

AES_key
1
3141317a5031655035514765666932444d505466544c35534c6d763744697666

Targets

    • Target

      782628fb2d316667fe65903efe6d4e9afdc7dbcafa0d5bf33203e0f6fcc40642.bin

    • Size

      4.5MB

    • MD5

      d879ff85d5ce1b13f7deb565afb88588

    • SHA1

      6567693fd429aacaf2323f8a5862ca9ee7455312

    • SHA256

      782628fb2d316667fe65903efe6d4e9afdc7dbcafa0d5bf33203e0f6fcc40642

    • SHA512

      cce8ba50eb388330b34455ec1840c38d8fee998c869d8a99aab438780d22c110fb88d36a4a5d1fc74882b890e26533ee5e0e3ed4bd1b990ea37a62686661f962

    • SSDEEP

      98304:TSueyeMMn6GSdWJtU5HV7LrJ/OvwWKtD6LNaBJvPbMNixCivmjFOOWrb:e7pMMnx0WJtYdXcTKR2WlQjo

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.