Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

11/03/2025, 05:19

250311-fz4hbasqx8 10

11/03/2025, 05:17

250311-fyy67stvew 10

11/03/2025, 05:15

250311-fxq47sspz6 10

10/03/2025, 22:02

250310-1xw1nsz1av 10

General

  • Target

    cde634ac2435441a5bef4befaf4b4acc68393bf02380ac0cdebd5104be99cf31.bin

  • Size

    4.4MB

  • Sample

    250310-1xw1nsz1av

  • MD5

    a993c52e3f70025fe896428a4b43d9a6

  • SHA1

    4a156e2db4319c3e20a1678277237e323a0c963c

  • SHA256

    cde634ac2435441a5bef4befaf4b4acc68393bf02380ac0cdebd5104be99cf31

  • SHA512

    056515f44cca830987d41aa1d5f932f5bb5920556b9cfbaa405da28459d18362eff714852f5912122ded92b4d89b653abf37b0a60a9d68b75688706d4e54a590

  • SSDEEP

    98304:pdDPNsl3JKkr5J+ZGdAt1sFIPp00HcKhQcfLTbBFjOj6rH:fDPNa5KklgodFiG0JQcfL3Lb

Malware Config

Extracted

Family

anubis

C2

https://google.com

Targets

    • Target

      cde634ac2435441a5bef4befaf4b4acc68393bf02380ac0cdebd5104be99cf31.bin

    • Size

      4.4MB

    • MD5

      a993c52e3f70025fe896428a4b43d9a6

    • SHA1

      4a156e2db4319c3e20a1678277237e323a0c963c

    • SHA256

      cde634ac2435441a5bef4befaf4b4acc68393bf02380ac0cdebd5104be99cf31

    • SHA512

      056515f44cca830987d41aa1d5f932f5bb5920556b9cfbaa405da28459d18362eff714852f5912122ded92b4d89b653abf37b0a60a9d68b75688706d4e54a590

    • SSDEEP

      98304:pdDPNsl3JKkr5J+ZGdAt1sFIPp00HcKhQcfLTbBFjOj6rH:fDPNa5KklgodFiG0JQcfL3Lb

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks