Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6122b9dffe35dee8d07d43c561efb6a296386e5e0116be48808791c96b1ec05b.bin

  • Size

    1.1MB

  • Sample

    250318-1z5qlaytfw

  • MD5

    753585f38cb3f482205acd24ec77e749

  • SHA1

    9555bad47cb32aa0c21574b84a6a4ef47ff6842f

  • SHA256

    6122b9dffe35dee8d07d43c561efb6a296386e5e0116be48808791c96b1ec05b

  • SHA512

    6345089ccb217b4a593971596f2728d5c5095e19216daae8ae2b960eb9b93bac097f5273f679c5a84075147228a3d975125af3e9e2a275ba75bb5c918e6c5b47

  • SSDEEP

    24576:OG9NfvXf0DYlLQWeIwR9T5ojyVTg/zVHy:OGPAkDwR99XVTg/Vy

Malware Config

Extracted

Family

hook

AES_key

Targets

    • Target

      6122b9dffe35dee8d07d43c561efb6a296386e5e0116be48808791c96b1ec05b.bin

    • Size

      1.1MB

    • MD5

      753585f38cb3f482205acd24ec77e749

    • SHA1

      9555bad47cb32aa0c21574b84a6a4ef47ff6842f

    • SHA256

      6122b9dffe35dee8d07d43c561efb6a296386e5e0116be48808791c96b1ec05b

    • SHA512

      6345089ccb217b4a593971596f2728d5c5095e19216daae8ae2b960eb9b93bac097f5273f679c5a84075147228a3d975125af3e9e2a275ba75bb5c918e6c5b47

    • SSDEEP

      24576:OG9NfvXf0DYlLQWeIwR9T5ojyVTg/zVHy:OGPAkDwR99XVTg/Vy

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks