Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    785d81c36bc52158b87bf1669cb4cc2e21e80d9632d5aa2233439f02f7dc0767.bin

  • Size

    4.4MB

  • Sample

    250315-1z831sylz6

  • MD5

    2828a62b52a3bdef1aebe4f01469e262

  • SHA1

    7a3423d01fc17327bb24330c3dbce80b31bf1c5e

  • SHA256

    785d81c36bc52158b87bf1669cb4cc2e21e80d9632d5aa2233439f02f7dc0767

  • SHA512

    fc4b751070854d7fdc3628c7889e2d2431b282270e518da570f1025505368016fc241ce653df19723fdabccef2cc80d61a90686800b13c2893b19972dacc4891

  • SSDEEP

    98304:1Hfrbzu92CPauj1JHUNtl0F6DJ6ktBknUKsmGqFf7oZ:892CTjzalZ6ktByUKRFTM

Malware Config

Extracted

Family

anubis

C2

https://google.com

Targets

    • Target

      785d81c36bc52158b87bf1669cb4cc2e21e80d9632d5aa2233439f02f7dc0767.bin

    • Size

      4.4MB

    • MD5

      2828a62b52a3bdef1aebe4f01469e262

    • SHA1

      7a3423d01fc17327bb24330c3dbce80b31bf1c5e

    • SHA256

      785d81c36bc52158b87bf1669cb4cc2e21e80d9632d5aa2233439f02f7dc0767

    • SHA512

      fc4b751070854d7fdc3628c7889e2d2431b282270e518da570f1025505368016fc241ce653df19723fdabccef2cc80d61a90686800b13c2893b19972dacc4891

    • SSDEEP

      98304:1Hfrbzu92CPauj1JHUNtl0F6DJ6ktBknUKsmGqFf7oZ:892CTjzalZ6ktByUKRFTM

    • Removes its main activity from the application launcher

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Queries account information for other applications stored on the device

      Application may abuse the framework's APIs to collect account information stored on the device.

    • Reads the contacts stored on the device.

    • Reads the content of the calendar entry data.

    • Reads the content of the call log.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Listens for changes in the sensor environment (might be used to detect emulation)

MITRE ATT&CK Mobile v15

Tasks