Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8
-
Size
6.9MB
-
Sample
250321-v56l7axrv7
-
MD5
6f60dce97fd9ec8b39dae1e662fc2918
-
SHA1
3285afaff80673b937235e026492796cc6b36afe
-
SHA256
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8
-
SHA512
de0be2b2792ec19f4c68e44435cba426b6a58844fbed9f4b7876f5ba0286359a7ca28dcb7310948346087226b7f267c5b6f21be4d7a8a52cee26ff7339c6780a
-
SSDEEP
98304:uDd2ZrWHFb3eMkRbAYMl6oUAuxDCWrauCY53h6bnl2C4mbgjFfyZGHsaGsiLQNNt:Q3AR/oUASWY53kaXiLqNkmrt
Static task
static1
Behavioral task
behavioral1
Sample
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral2
Sample
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
ermac
http://62.109.30.102
Extracted
hook
http://62.109.30.102
Targets
-
-
Target
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8
-
Size
6.9MB
-
MD5
6f60dce97fd9ec8b39dae1e662fc2918
-
SHA1
3285afaff80673b937235e026492796cc6b36afe
-
SHA256
6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8
-
SHA512
de0be2b2792ec19f4c68e44435cba426b6a58844fbed9f4b7876f5ba0286359a7ca28dcb7310948346087226b7f267c5b6f21be4d7a8a52cee26ff7339c6780a
-
SSDEEP
98304:uDd2ZrWHFb3eMkRbAYMl6oUAuxDCWrauCY53h6bnl2C4mbgjFfyZGHsaGsiLQNNt:Q3AR/oUASWY53kaXiLqNkmrt
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
2.9MB
-
MD5
8942dc88d64e0d87c7f2b4b09c1c24c2
-
SHA1
f15cdada2a64a6dce065fe7878902b28366eb822
-
SHA256
d7d84485a7c19a0a90f1d7165ed91d323195ba3c6298159efa4f696453064d8e
-
SHA512
2a99ac1c16f660efc84a2a5d4b7e946171f15724b229861cdf822a267045a16ce7522d542c026214f61c8b3da20d69e7005a23705db7ab0d084c5dbaca2839f6
-
SSDEEP
49152:iqHc0DU8Hqd+gCKpIIpVyHDDvmCTkchCv5pZxG/juyUogE2mjFwJBMWdJU0g:IWUiuwKnVwXvmCTx6TGbzAmjFOOWTPg
-
Ermac family
-
Ermac2 payload
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1Suppress Application Icon
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1