General

  • Target

    4c52e6a16bf9df19fa77455a7c87eaba81fcd094d547004306122d83dda36bdd_JC.apk

  • Size

    3.5MB

  • MD5

    2bf79ecbf3a9cf2b7e8e4d99087a74a5

  • SHA1

    2456291fc376aad939c5673029440876fd59e45e

  • SHA256

    4c52e6a16bf9df19fa77455a7c87eaba81fcd094d547004306122d83dda36bdd

  • SHA512

    b3db8899ecc4a24e78dc37cb4e5d9fdafc209770cd60060c0eab781a15ed4bde4f535cba18860eb2015b03efab1320e52ad0986a53d412145cdb1ffd2c52423a

  • SSDEEP

    98304:lSPL6efffnRcj7jGPJqQdG8BMSqVauu3kKSz4hz7:lSjXcXgOVaj3tG4hz7

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://uploads.dachhost

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 4c52e6a16bf9df19fa77455a7c87eaba81fcd094d547004306122d83dda36bdd_JC.apk
    .apk android

    ir.shz.shzkisi

    .main


  • Toxic-Port.txt
  • lmain.bal
  • url.txt

Android Permissions

4c52e6a16bf9df19fa77455a7c87eaba81fcd094d547004306122d83dda36bdd_JC.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

ir.shz.shzkisi.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS