Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38
-
Size
11.3MB
-
Sample
250321-xmglfszms6
-
MD5
3db7b048b30968866463cb2987457f8b
-
SHA1
7c84efcbeb839e00f27271aeb0a06f45e87f08c8
-
SHA256
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38
-
SHA512
bc8c3f5b2d00da2e69ea365732d244d8f7dab615eace083f2bcac0c05f9bd0fd2358ef9b6689e728038052949b0390acb2d777f54e6dae6e18b2881ec13ab0c2
-
SSDEEP
196608:++ZCJB4PrnDwtE+sAMbM5Gevv8Tb2G/BLTG2/NGO6FcDdcE+8NjT4jrt4rIl2GoY:gJ+bcXsAMoxcv/BLH/9Y854quoMt
Static task
static1
Behavioral task
behavioral1
Sample
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral2
Sample
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral3
Sample
base.apk
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral4
Sample
base.apk
Resource
android-x86-arm-20240910-en
Malware Config
Extracted
octo
Targets
-
-
Target
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38
-
Size
11.3MB
-
MD5
3db7b048b30968866463cb2987457f8b
-
SHA1
7c84efcbeb839e00f27271aeb0a06f45e87f08c8
-
SHA256
e48d8b5e607bcd5b9b85d3be271e96e7e088b551f03aae04f4129a1c1f0dba38
-
SHA512
bc8c3f5b2d00da2e69ea365732d244d8f7dab615eace083f2bcac0c05f9bd0fd2358ef9b6689e728038052949b0390acb2d777f54e6dae6e18b2881ec13ab0c2
-
SSDEEP
196608:++ZCJB4PrnDwtE+sAMbM5Gevv8Tb2G/BLTG2/NGO6FcDdcE+8NjT4jrt4rIl2GoY:gJ+bcXsAMoxcv/BLH/9Y854quoMt
Score10/10-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
-
-
Target
base.apk
-
Size
9.9MB
-
MD5
c63a7341b83657975615109f144e926a
-
SHA1
c486503ec21bf61620fd5749b9b9456e13e4b53d
-
SHA256
d838927c91197c21b1ecd43ef97590d63ad2351e23f90fd96483aa10eba93f1c
-
SHA512
9ee55b5c21e91f1e773c08b81e665691ced17c17bf879d53f6962cc9fce13fe7a3f8aa7c6b57aad39a9a3521b0d60596e8ea7c724431f765950d00698fbb4c50
-
SSDEEP
98304:TwdpTASe2WrSj7kVKdn5iSRG5CPVql6jgYt6+U93sx1DUUXTEPQRXG7zRsUq:cdidOj7kUNrTPVAVeDUAAoRXG7zRY
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo family
-
Octo payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Queries the mobile country code (MCC)
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
4