General

  • Target

    265353259d76ca55a91ef55c9f75334c.bin

  • Size

    2.9MB

  • MD5

    1be8fd206a55975b5d77b539750fc62f

  • SHA1

    1f073029afe39248297501237b6e159a83fb901d

  • SHA256

    ce6ec87e17f9726110dbfaca573bffde0f0adbfc0b2fe1c7ff71ca21363022bf

  • SHA512

    88163f3cfc03a0521c40010f376843119bd88b39850d4968e02e4bfbce9e4614d755cfae7fa706399d131e78a16dea06e5815de39770fc9edfd123d2eed3bbfc

  • SSDEEP

    49152:EGDihr7n8Uzi54HNf6fpP1HOmn+2LtOa+svrFZi2AJweEQ+ss23MeemCzBCakATj:EZhcUzxHw91Hp4a+0FZeoQe23MezECZ8

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 265353259d76ca55a91ef55c9f75334c.bin
    .zip

    Password: infected

  • a8b3bb8cd8e48cbad66a3fb77f9cbeaafa23c6881187aa46a7ddf11313cbcbca.apk
    .apk android

    Password: infected

    com.lydia.route

    .main


  • getewayport.txt