Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
148s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
11/03/2025, 04:45
Behavioral task
behavioral1
Sample
a2a9fb573c9f39e3654467efd78c9b5424de3033303facad972df1a5f8b2fa04.apk
Resource
android-x86-arm-20240910-en
General
-
Target
a2a9fb573c9f39e3654467efd78c9b5424de3033303facad972df1a5f8b2fa04.apk
-
Size
21.8MB
-
MD5
5d0a191d649631ec71b3fac157170201
-
SHA1
c32f47dc40985a3d6d6c47310e06b7b462d5c711
-
SHA256
a2a9fb573c9f39e3654467efd78c9b5424de3033303facad972df1a5f8b2fa04
-
SHA512
d61af45593a2b934c01d7a7742e69da881ca6474017a78e91683652c2c3e698b9da4be17c5d397ac407df31e00ddaa5da2692e75f9d39c0f16097deda11d8bfe
-
SSDEEP
196608:26eMt/k6ss4Lmos1sgAXFNgI7a7Yt3Zu9yzhLrZYGlQ1ZXY1uk53A3+j:3eucLLys3FNgIuQ9zhL9BgZXgtMO
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /sbin/su com.anydesk.adcontrol.ad1 -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.anydesk.adcontrol.ad1 -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries information about running processes on the device 1 TTPs 2 IoCs
Application may abuse the framework's APIs to collect information about running processes on the device.
description ioc Process Framework service call android.app.IActivityManager.getRunningAppProcesses com.anydesk.adcontrol.ad1 Framework service call android.app.IActivityManager.getRunningAppProcesses com.anydesk.adcontrol.ad1:remote -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the contacts stored on the device. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://com.android.contacts/data/phones com.anydesk.adcontrol.ad1 -
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.anydesk.adcontrol.ad1 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 26 raw.githubusercontent.com 27 raw.githubusercontent.com 41 raw.githubusercontent.com 47 raw.githubusercontent.com -
Makes use of the framework's foreground persistence service 1 TTPs 3 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.anydesk.adcontrol.ad1 Framework service call android.app.IActivityManager.setServiceForeground com.anydesk.adcontrol.ad1:remote Framework service call android.app.IActivityManager.setServiceForeground com.anydesk.adcontrol.ad1:remote -
Performs UI accessibility actions on behalf of the user 1 TTPs 2 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.anydesk.adcontrol.ad1 android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.anydesk.adcontrol.ad1 -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.anydesk.adcontrol.ad1 -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.anydesk.adcontrol.ad1 -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.anydesk.adcontrol.ad1 -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.anydesk.adcontrol.ad1 -
Schedules tasks to execute at a specified time 1 TTPs 1 IoCs
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
description ioc Process Framework service call android.app.job.IJobScheduler.schedule com.anydesk.adcontrol.ad1 -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.anydesk.adcontrol.ad1 -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.anydesk.adcontrol.ad1
Processes
-
com.anydesk.adcontrol.ad11⤵
- Checks if the Android device is rooted.
- Makes use of the framework's Accessibility service
- Queries information about running processes on the device
- Reads the contacts stored on the device.
- Reads the content of the SMS messages.
- Makes use of the framework's foreground persistence service
- Performs UI accessibility actions on behalf of the user
- Queries information about active data network
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Schedules tasks to execute at a specified time
- Checks CPU information
- Checks memory information
PID:4223
-
com.anydesk.adcontrol.ad1:remote1⤵
- Queries information about running processes on the device
- Makes use of the framework's foreground persistence service
PID:4458
-
com.anydesk.adcontrol.ad1:remote1⤵
- Makes use of the framework's foreground persistence service
PID:4901
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Foreground Persistence
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Process Discovery
1Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
3System Network Connections Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232B
MD543a0b9149cd280029ce491e104235969
SHA1c48c43956ea2ae4057472272c9d8a330bf2be77a
SHA256d69cabe5f96f220b6e796ef44270e88b6b59636bd38b30297340c380ef0ec2b7
SHA512b65e8145036c36e17d5e2b982d4e735f8a3bca9b9c0f09fc34188e232826dcb0cbc56bc23e39dfd6e2657b3adf57048f826d626ed239af05fee146aa442ee94a
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
143KB
MD55dc1983554a88c2a224ee046bb7314ec
SHA15b09273776014bf32fd8aa7bca9ce151d2c7d98f
SHA2566a4d32e8ef673e70a8a4963124417be10eb09089f3aa049e1e3c7de515c69f21
SHA5125ce30ef36c25d33f3416006c103608057a9cc88f2d88fe37de3bd895d68a005644d74aca0abd5bef02f2ed17709a38ae249b0dabeaa16d1c46c8a8c9d85c7e88
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5fc47f257547e19ec41b7a7e1d7c6979c
SHA1df621ed755573bf25465af78bad76d176f2d8d15
SHA256b281b960e68418941ff82ae106d4763a133835a043be77e52cf057482da29fed
SHA5122f25b758bae5f2dc2dfc0662973ebaccbd445f615e7b79927724afdea3eecaa60d87e16e11aee994859add1ee9c3c6129c9657c77b8da056bcb854e239a05d0d
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
88KB
MD5f18bd0aaf12c0f1fa1d8eb22fbb262dd
SHA1e03bac4f05def195b50933bf00a3de444e032c82
SHA256e478c481962b1ad144f684c306451c538d0b97f27989cec459333ecaaa1c3d5c
SHA51208b45a5d8986002775b9b2f0072ec72d7c0500290053e14983f18f03f539169cdf9d0ac31f9ec427f19a350cb0c261e1a9ed5c2b580b96627eedb169f49c08c7
-
Filesize
13B
MD57176ca7f522a85c95becb43e22ea4575
SHA1551a7604dd57add090e61095b48044e9d64ec965
SHA256d543b822c65bc3998941b83c29d77f15b0c693a71d471ba636158ac3ef059817
SHA5122c94bb4eb20a29fbc068a22c269f660a04e395e76f90c4d9eeceaba1c09bc4adfaf8ad737817002ce07b20937eba5678491f7b785d8fbf7b1b624174f5c7aa50
-
Filesize
4KB
MD5620f0b67a91f7f74151bc5be745b7110
SHA11ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA5122d23913d3759ef01704a86b4bee3ac8a29002313ecc98a7424425a78170f219577822fd77e4ae96313547696ad7d5949b58e12d5063ef2ee063b595740a3a12d
-
Filesize
24B
MD5d7c187d245554592c2b70783c94f5c10
SHA1d6ae926638f9260a5c931ac97fba646ac24e24a4
SHA256b19f44f36967a9df002f85aadf34bf9176dbaf52216c640f410bca9483d0a9f9
SHA5123a6e8c7a11ae907af16e359fd285b01fd42b0ecf65407053a8089d2f2126fb6888bc18f59e76a94ad680ec319b7bcf07e18f531e21aa1c01422ef6ccefe39a9b
-
Filesize
8B
MD582afb90d2e46ef3a798b1c9916052cfc
SHA17121b65d0dea91c69530f74440ef65e9be1425de
SHA256c389d066db580483d0c9668c7a301e776f416df4fb730cd8db68eefeaf5a870b
SHA512b3d9bb450369fafc40ab71c5af97f7fa114fbb26423e03302216333d22c062270e87d74dca52f1ec0f24bef408a9e3493feaf8a790965e159563c49b35d459b7
-
Filesize
1KB
MD58de5d399c105c57f0b45d5c8f6ed0449
SHA1cbad34085d55f82a0fa40a37d47641c8a22a1a27
SHA25638351b9addf6110945f95cdea4ba18cbc47367168dc651a60309abd6778e5930
SHA512f5a7aa4eddf2b65f57266711ebb8231f9e8283d160cfd3f0267205fbc496938aba29ecf7c454dc81aeaee151089aaf5816d4b1a07a608937289e010b706cf1a2
-
Filesize
13KB
MD506205da75448ee41602ff0b0732543ae
SHA1b4a921c75323c0d04cb853cb00d52e54a23f6826
SHA256ed6c98468c0a4784bf14a11e7af4813e66d8e2f548cd0915257e0b97f95c4a4f
SHA5127453255c1544a0c072cd751e67c208c3a1d30760512d746f89734977a24c526cb1502c76ebf611c5ff7bb8eb7ef4f9faa6320598568037065c91ad3dc9834dfd
-
Filesize
1KB
MD579dff4835df15c648279801a35bb6c58
SHA10bc7401bccda1653d70b8ed0fa44277181eb366e
SHA2564e31e03abaca4aba6aa49220e7cf862185b2dd5d27f870fee0ef65e5f4dd4691
SHA512e603f320d125b6369ca9d493ad1a807fafe2744b291974682bc302d55991ec85ac89452aa083beeeb34a08ded571e84b501c034b2b9ff60008a8973931b29dff
-
Filesize
27KB
MD5f7aed259dc2bd23db98e9985d0eaf54a
SHA1a4b5746ff48c5d6ae0503badc8372b2ff9771c69
SHA2562b109ff0e6ace75becf217b5f1db6a91a8c3c349a17136e6c67ada4c5df6fd54
SHA512a8b20cdf2a2154a323ca50d9659005119a7feaa01c585bafc36ab965f10526c32376ec005bdf509a46d40fe648502651a3c842288b851f473fe979f35c40f43e