Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
17s -
max time network
151s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
11/03/2025, 05:49
Behavioral task
behavioral1
Sample
fe4b2b288565cc1a85b7dd23398cc8ab850b0b0c73d46ec9e7c308af86a96d60.apk
Resource
android-x86-arm-20240910-en
General
-
Target
fe4b2b288565cc1a85b7dd23398cc8ab850b0b0c73d46ec9e7c308af86a96d60.apk
-
Size
22.1MB
-
MD5
c7dd3e08e9f1d2c16ac9d51aaeb4c1cf
-
SHA1
db342f35467cad79035f0fa2b77fdb427cf981d0
-
SHA256
fe4b2b288565cc1a85b7dd23398cc8ab850b0b0c73d46ec9e7c308af86a96d60
-
SHA512
7b769e0d24a6e6da4801752b5fe5903d671e3ff629dad2daa33fa2c754b84aaa1865643699b170cc11e9a0d72d5c5b51c78e0a3b77afc9749aee3969db5c8b7f
-
SSDEEP
196608:UPCoCv1HxcjCVWy5RtVUs1sgAXFNgI7a7Yt3Zu9yzhLrZY/snFphv1rnFphvwnFF:UYMjCVWy/Zs3FNgIuQ9zhL93Y/+edD
Malware Config
Signatures
-
Checks if the Android device is rooted. 1 TTPs 1 IoCs
ioc Process /sbin/su com.pabe46age.pak -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Reads the content of the SMS messages. 1 TTPs 1 IoCs
description ioc Process URI accessed for read content://sms/ com.pabe46age.pak -
Enumerates running processes
Discovers information about currently running processes on the system
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 27 raw.githubusercontent.com 29 raw.githubusercontent.com -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.pabe46age.pak:remote -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.pabe46age.pak -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pabe46age.pak -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.pabe46age.pak -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.pabe46age.pak -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.pabe46age.pak
Processes
-
com.pabe46age.pak1⤵
- Checks if the Android device is rooted.
- Reads the content of the SMS messages.
- Queries information about active data network
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4273
-
com.pabe46age.pak:remote1⤵
- Makes use of the framework's foreground persistence service
PID:4593
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Foreground Persistence
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD544e9f9bce203941443cc2c120d08359e
SHA15633e40abfcb662fee22017d9207f42b488a6ae8
SHA2564878254a77a3792bdc0067cfa40bc3c240b49dfea68440d6263cefa06dcfed32
SHA512fee4a9defe4a8e1cc017d9b531e5d5eb14198a8c8c4e3eba0db62b668882984c0437b1e703943e6cee55df44817250e2f5064cc59edb46023d2292f928bca248
-
Filesize
58B
MD50d210bfb2a0e1f1b4c082a6a0f79de07
SHA1bb8ed9e364db79d1d9f2fcde3f15091893222faa
SHA256988722c23d78a46021d0e7ca9deee7aa8bb83288269174ffacb7316f381cca1d
SHA512536e9867b0df29b15b789f8949be6ab37fcdeccb9d39ded981da7dc2052c9533d0ec0e6f9a5444132977605d372e1463d91bdde41b528ff2ca3f65ab152325c1
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5bc1f443e4614158f80f3ab0a7f8f220d
SHA1c0c59f04f651c8796722182eac35abae12ab1e10
SHA25656b73df07a5ac1b70d22c6f24be57115c714a65f1945cfb8f68e301f9d209080
SHA512631e7140062cf683d0a0263c86dd203b382063f3913997c950e185924845c5adc349f91888bd8c9edfada8df6bbcc16995de01f8285f2e0617fcb2ee677eb414
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
297KB
MD5c1d7728e1ba612c18fd9f7bdcc7014b6
SHA1727e70dc047c6e18991431bbb07db9bf79e9e7e7
SHA25682c85aa9e4d35f35176b3005ec0cabf3b6508021539ebfa7a1dfcb4ac185735c
SHA51227ffc860d1fbd3a9b4d214ca23ab4624ce02d06905a1115326b2fae0c96eccd7202371fed9c70d34093d93777583e2f5b7c33bb6b4330a3491ae27d381ce1afa
-
Filesize
13B
MD59fb058ee890d299e0d1afed2440f772b
SHA158d8a05fb250071038c8bc024593c7e4d4453ab5
SHA256fe303136b50eb4e0cc43b564f214bda7bb39c6d1dc81b04faf7df0fc53d7c60d
SHA512417b80cab6823c19501d772c24338c683c464be6ade961b938e841ce955bd2195d6b9aa4f609b4a85fc068f951a1fcf1281e1261fd414e0ec08c295c1ee2746a
-
Filesize
4KB
MD5620f0b67a91f7f74151bc5be745b7110
SHA11ceaf73df40e531df3bfb26b4fb7cd95fb7bff1d
SHA256ad7facb2586fc6e966c004d7d1d16b024f5805ff7cb47c7a85dabd8b48892ca7
SHA5122d23913d3759ef01704a86b4bee3ac8a29002313ecc98a7424425a78170f219577822fd77e4ae96313547696ad7d5949b58e12d5063ef2ee063b595740a3a12d
-
Filesize
96B
MD527d0d4d9877997dea1ff81f9db3e4c55
SHA12c49b930f5b47782caf31a00e6a14beafdb4f270
SHA256ab278047bb6126e8c87ae1c3f49e9b179a175da703133cec9110ddc2100d1e83
SHA512e8146b4b37af6a6a003444c479bb296e0d9b5cfbb1a22fb1733c62d930ed7792cf66df7e3bbb538f046087bde477e0b74ea8689ca068e7ce000b68357bb11d78
-
Filesize
5KB
MD50d5c97d8239e2a80adae7ac263df5588
SHA124f9a0893f57acf27a533633107a3a5a2533c83f
SHA25665b7bc7f5c239e799c7de37c97261f184900162960b7e1f248d2d09be44e35ad
SHA5121f327b36a43ffb6bc6c770bb60a0bb93da8900d53e72d0c1d5efdf9b39eda74ea7bec655b94817231993fc7aa777127e63087f7c393d4180b7268f62071534d8