Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
158s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
19/03/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
400743ebcbb56f4f00a7339cff9b769e1c53788e7276803753dc4eb9f8af5563.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
400743ebcbb56f4f00a7339cff9b769e1c53788e7276803753dc4eb9f8af5563.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
400743ebcbb56f4f00a7339cff9b769e1c53788e7276803753dc4eb9f8af5563.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
400743ebcbb56f4f00a7339cff9b769e1c53788e7276803753dc4eb9f8af5563.apk
-
Size
2.7MB
-
MD5
55d2c5ba2c8b7b9f60ade9873c9930a2
-
SHA1
9b84ad59e396a134f429eab29c29eefef71e1860
-
SHA256
400743ebcbb56f4f00a7339cff9b769e1c53788e7276803753dc4eb9f8af5563
-
SHA512
422c5c54958f273bacef679d463db04f23c890c2ab0a5bebc491068fdf08aee813bd1992cb79118191394b4093e900fab7ff152721365952f0b732dcac5b98e4
-
SSDEEP
49152:dTtAv5xDCr6U2LaaB6YBuXParrVp4g3oSZUv1SRdcJ73wz6srK0HaCi/yJ5ITQGE:dTtg5La3MDGtSRW73oRPXCyJ5ITQGdW
Malware Config
Signatures
-
Antidot
Antidot is an Android banking trojan first seen in May 2024.
-
Antidot family
-
Antidot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-1.dat family_antidot -
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex 4222 dev.decryptapks.downloader.qwertymods /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex 4248 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex 4222 dev.decryptapks.downloader.qwertymods /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex 4222 dev.decryptapks.downloader.qwertymods /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex 4306 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex 4222 dev.decryptapks.downloader.qwertymods -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone dev.decryptapks.downloader.qwertymods -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver dev.decryptapks.downloader.qwertymods -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal dev.decryptapks.downloader.qwertymods -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo dev.decryptapks.downloader.qwertymods -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo dev.decryptapks.downloader.qwertymods
Processes
-
dev.decryptapks.downloader.qwertymods1⤵
- Loads dropped Dex/Jar
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4222 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4248
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4306
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.vdex2⤵PID:4329
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.vdex2⤵PID:4343
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.odex2⤵PID:4362
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/oat/x86/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.odex2⤵PID:4381
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/6llz3R6LVLhMaBtgGe8yfdRLaQA5O2mf.dex2⤵PID:4401
-
-
rm -r/data/user/0/dev.decryptapks.downloader.qwertymods/app_ded/QfZF5BzeOoj0QleOT2wyTNW8RFeLXK0I.dex2⤵PID:4427
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56cfa2ce4e3329ec470c094110b2bbd50
SHA1ca5341cc8bb1b52e42c9569b4d3c8897dbd93f1c
SHA25646eaf8c41981a560d1590bab5a2b4c4cdf11c5f4ec0e0faf07023244262a0be7
SHA512f19e181e1aac80cf47dac0f819e25c97547c4145361a1dec9a82a405fd78e34aa1858d3c3b193b44cd512066b4e836673801901456e1dcc498d15be4e3450296
-
Filesize
96KB
MD56c9e4d1af5d241e76116e05b07e8e0e3
SHA14a33d452e68e310e36e9ceeb2c7f355b97d82f7d
SHA25658816ebafa9d2f8893a646e41dc7006612e3abed88f73b022e951d367775d5d3
SHA51210ec6e2ae11a6db830ae2d2ced1f91e9a18b7ad6b8a67171418888b1bbaeea1492ef04fd15333b75a06d4bf9aa93b1aa2261f5533f2c368b4942ad98d214389f
-
Filesize
24B
MD5a1341b33384157c72c96c53f8026d794
SHA1a059896e2091887ee61390429ebde40c0382dd65
SHA2560f3c6fcef137f683ad68fc13bf0b633cea51f166b23401f9075a92d6099d81f8
SHA512ad4ce786096213a0a941f5f1a3dc967cc42bdf463d265190807f715ed94301a67d2174e3cac5bac6d3afcf11203a246d0abbd731716707550f6a5d850a4ddcd1
-
Filesize
1.7MB
MD529eaacc6aa31b983c9e8ecb6a8c6d994
SHA12838034463c3dea564b2e0ffcdffc702c7855641
SHA256e4f32caf58be8c081324ba44bfd9c3edf138714e11ec62c118b01e51440e8ea4
SHA512ba8b74ccfbcb667975c8956d11119cfe435ae3a70fae2a6fa41befe2d27a573abca2d840ea51a5db5db0be0c69b65d533488d7c368f73c888f3cb94838af1e54
-
Filesize
96KB
MD5ed8add114246c548a4b8d51e6cd7c6ba
SHA1844bc8f6fd2c6f12f657b7a169ffa4805771a63a
SHA256bd4ce48926e62021eeb45313181bf96293b37bfe09af4b11237aa8458bdd97d2
SHA5127955ace6cecf990964b14f9412835418ae883306b329a32d74162326f959b4ab33f58a0544928817a4d3b7c27e0f8160d654eab1f859f5324af01f66a4ea180e