Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea
-
Size
6.7MB
-
Sample
250321-wwxtcsyp13
-
MD5
14b46f1edcf05bc4af5727e60b18a3c7
-
SHA1
5f0b671697616636d167503df11d491725dd7dff
-
SHA256
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea
-
SHA512
9a65bce3d9e585f7c9bfa04ba7d0e095ae2918ad3a71af200b61fcbc82f96fa5794216613af9e9cb6c2b24326252b1eeaff419ada14046e4aa49ca82a32d75b7
-
SSDEEP
98304:x7d2ZrWkxy8rfyMbAmq22dSu1TCi/OdKOwqunN6vJY66cLqW1JVLCaQkoD46XI2L:mkD22dSCTx/e6na+wTNCacDH7
Static task
static1
Behavioral task
behavioral1
Sample
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral2
Sample
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
ermac
http://91.107.127.141
Extracted
hook
http://91.107.127.141
Targets
-
-
Target
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea
-
Size
6.7MB
-
MD5
14b46f1edcf05bc4af5727e60b18a3c7
-
SHA1
5f0b671697616636d167503df11d491725dd7dff
-
SHA256
82756f8f6c01472bbf899fe06059fc11f847801f80539e73ba20ed04722f0bea
-
SHA512
9a65bce3d9e585f7c9bfa04ba7d0e095ae2918ad3a71af200b61fcbc82f96fa5794216613af9e9cb6c2b24326252b1eeaff419ada14046e4aa49ca82a32d75b7
-
SSDEEP
98304:x7d2ZrWkxy8rfyMbAmq22dSu1TCi/OdKOwqunN6vJY66cLqW1JVLCaQkoD46XI2L:mkD22dSCTx/e6na+wTNCacDH7
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
2.6MB
-
MD5
ec0442fd2e2cad475a7d411a0a81ba9b
-
SHA1
70c9c18ed6e38b8358ad2cfa3f6d525fa7fb4b5c
-
SHA256
cc813b2f353e5468f44cad22e3bd270d200caf4da00286e0d1c2caa36f3bfcfe
-
SHA512
53a2a37169c233ee775372faf197689cdeb051081e0ede69a7bf627f6f523c075cc6f86a26dd95b0056cac284edb578ccd2d747cb65332685ad4e48e9610899c
-
SSDEEP
49152:FqHibwL29bGAg7FQJKJukhcbvMgE2mjFwJBMWdxMoeBK8KO43AF8m5uSGs:hcL29brk2JKngrmjFOOWj0pKO4Fs
-
Ermac family
-
Ermac2 payload
-
Hook
Hook is an Android malware that is based on Ermac with RAT capabilities.
-
Hook family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Scheduled Task/Job
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Process Discovery
1System Information Discovery
2System Network Configuration Discovery
3System Network Connections Discovery
1