General

  • Target

    5a7abcf4410f973e04c291a45490c1f9.bin

  • Size

    2.5MB

  • MD5

    b75e2703bae763a80a86934fe30689cf

  • SHA1

    72298bf7de4dc3a129c42c65e9ae2f1fb4dc13fa

  • SHA256

    051639c8d92e634577300c68ba11c99a1207261800a044db802c7fd70d28f98f

  • SHA512

    2594cea5529e99ca2e2a68e4f74771c735a04e93c220e9ec6780753bc4c13047bc0702961424b17b86d90bb39b3cf3b3efb9fe087e54dd4f557673775e9b4bf8

  • SSDEEP

    49152:S47Fp1bjNJJvjvPUVom/ID57frxjMTbxKaRU5M4ACTv0a:S6F3Jnh7T5MBKaRU59J

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • 5a7abcf4410f973e04c291a45490c1f9.bin
    .zip

    Password: infected

  • 20ab2fd5eaf5c0a332e024373e30a2dd16819a6a1edc36953906c40dc9afdb6a.apk
    .apk android

    Password: infected

    free.to.use

    .main


  • b4x_fontawesome.otf
  • first_sms.txt
  • main.txt
  • ph.bal
  • port.txt
  • you.bal
  • you2.bal