General

  • Target

    ᏞᏆᏙᎬ.apk

  • Size

    1.7MB

  • MD5

    d78fdb8b1c06e69a613f17f98fa5f2f7

  • SHA1

    129c7e2efd40c013e89deb92b51c7b6f9e417c69

  • SHA256

    56b6a738ee0a61201c074974786e3f6a0585385e3a98a7d3929dea99e1da07fb

  • SHA512

    ffcc31638cf97dc7c7884914b5621d12b322145e0c90549fd210f4124a0f739292aca52d3b8612d772912e290e50216e99ab4f6a3f8ed682a36f9f7c6dfb3ac4

  • SSDEEP

    49152:IUcXkvB2XMPj4tJME1u6X8SjpHa76hrM8KyVCO1zAn:0+MMPQ1u6Xhj08KyVD1zAn

Score
10/10

Malware Config

Signatures

  • Brata family
  • Brata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • ᏞᏆᏙᎬ.apk
    .apk android

    edward.org

    .main


Android Permissions

ᏞᏆᏙᎬ.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

edward.org.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS