Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8

  • Size

    6.9MB

  • Sample

    250321-v56l7axrv7

  • MD5

    6f60dce97fd9ec8b39dae1e662fc2918

  • SHA1

    3285afaff80673b937235e026492796cc6b36afe

  • SHA256

    6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8

  • SHA512

    de0be2b2792ec19f4c68e44435cba426b6a58844fbed9f4b7876f5ba0286359a7ca28dcb7310948346087226b7f267c5b6f21be4d7a8a52cee26ff7339c6780a

  • SSDEEP

    98304:uDd2ZrWHFb3eMkRbAYMl6oUAuxDCWrauCY53h6bnl2C4mbgjFfyZGHsaGsiLQNNt:Q3AR/oUASWY53kaXiLqNkmrt

Malware Config

Extracted

Family

ermac

C2

http://62.109.30.102

AES_key

Extracted

Family

hook

C2

http://62.109.30.102

AES_key

Targets

    • Target

      6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8

    • Size

      6.9MB

    • MD5

      6f60dce97fd9ec8b39dae1e662fc2918

    • SHA1

      3285afaff80673b937235e026492796cc6b36afe

    • SHA256

      6df98f4c4b1a9c147a996854b9624d51828585fdabb6be0b56014d874d9f24d8

    • SHA512

      de0be2b2792ec19f4c68e44435cba426b6a58844fbed9f4b7876f5ba0286359a7ca28dcb7310948346087226b7f267c5b6f21be4d7a8a52cee26ff7339c6780a

    • SSDEEP

      98304:uDd2ZrWHFb3eMkRbAYMl6oUAuxDCWrauCY53h6bnl2C4mbgjFfyZGHsaGsiLQNNt:Q3AR/oUASWY53kaXiLqNkmrt

    • Target

      base.apk

    • Size

      2.9MB

    • MD5

      8942dc88d64e0d87c7f2b4b09c1c24c2

    • SHA1

      f15cdada2a64a6dce065fe7878902b28366eb822

    • SHA256

      d7d84485a7c19a0a90f1d7165ed91d323195ba3c6298159efa4f696453064d8e

    • SHA512

      2a99ac1c16f660efc84a2a5d4b7e946171f15724b229861cdf822a267045a16ce7522d542c026214f61c8b3da20d69e7005a23705db7ab0d084c5dbaca2839f6

    • SSDEEP

      49152:iqHc0DU8Hqd+gCKpIIpVyHDDvmCTkchCv5pZxG/juyUogE2mjFwJBMWdJU0g:IWUiuwKnVwXvmCTx6TGbzAmjFOOWTPg

    • Ermac

      An Android banking trojan first seen in July 2021.

    • Ermac family

    • Ermac2 payload

    • Hook

      Hook is an Android malware that is based on Ermac with RAT capabilities.

    • Hook family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries the phone number (MSISDN for GSM devices)

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks