General

  • Target

    56d7841dd8c8e7550d285c64a822dafea5eca6bbe4eae0c0761f86e9a597823c.zip

  • Size

    3.3MB

  • MD5

    c739f789cd13fa3b3db837dbfe982919

  • SHA1

    cee1c8c0dce6a41727ffb665b14d872b0f13b397

  • SHA256

    6fd27712fa1a93f816ebb841b530a3dabad05326bd834995763c8c8a30041b70

  • SHA512

    48419989ef3e398582763d611c5ccca273dffe9aa830eea26649dc7ba13e68c4483b838b70c537fec41571faf2ef7a358e460968f4b59e4edac47d9034f9c956

  • SSDEEP

    49152:FwTj5OYVlc/N1AN3ZRtNqHhJrTwtVXz5yOSJe9J+3UarWbkVaijkH:FExKANztUH3rTwDDkzJeJSAR

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://iuskmmdm.tk

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 56d7841dd8c8e7550d285c64a822dafea5eca6bbe4eae0c0761f86e9a597823c.zip
    .zip

    Password: infected

  • 56d7841dd8c8e7550d285c64a822dafea5eca6bbe4eae0c0761f86e9a597823c.apk
    .apk android

    ir.shz.shzkisi

    .main