General

  • Target

    Game.apk

  • Size

    3.5MB

  • MD5

    ee85076d4bf249279d017ac2671185d9

  • SHA1

    8fa1f8c99a7cfbc1f496c44f25fbf79c502afb84

  • SHA256

    935cb5a5078af3b14b69ab24f707e6fe40793320d1d3d6b8f9f84b9dd06467f4

  • SHA512

    4bbc0701fe8b8e35c34f99e7d211457a934b7c397c371b5eb5b47c458e1c2d4503ae3eeb2aa100be45c7605d75f50a67d02cd8f2e3038d45fba618a0ccad48bb

  • SSDEEP

    98304:Pqi6efffnRcj7jGPJqFkRfgey2gOAWkAV7iNmqxkod:PZXcXgektyVO7H+Nmqr

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://adlirans-usiran.ml

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • Game.apk
    .apk android

    ir.shz.shzkisi

    .main


Android Permissions

Game.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

ir.shz.shzkisi.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS