General

  • Target

    NEAS.sahamedalatapk_JC.zip

  • Size

    3.0MB

  • MD5

    c5d68490bbda4773ea03caff9f264428

  • SHA1

    ca97d89de7334b9c4b1bb7c6329ae40619edaea0

  • SHA256

    b1820179fc4818e3939b63113ad5ab22efde2ebae63c1002fc7d90debb59061a

  • SHA512

    1fcfdf10ccfb6a4a3e762e88bd9d9459ad2ce2ba90740cca7cb087943a3643183406190ca57611311b137a46b9b66e7a263c6542ff751a2fe04a0b09f0901425

  • SSDEEP

    49152:NPagnrYa6oETBHR8HpolpZRh6zLI/ZwvRZswTxFavs9h3vWyPgLYMJvAkldZHs/p:NPn1zETBRcilzR7gmQqvs9hwJvAk7p1K

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • NEAS.sahamedalatapk_JC.zip
    .apk android

    com.lydia.route

    .main


  • getewayport.txt

Android Permissions

NEAS.sahamedalatapk_JC.zip

Permissions

com.lydia.route.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.VIBRATE

android.permission.POST_NOTIFICATIONS

android.permission.READ_SMS

android.permission.FOREGROUND_SERVICE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

com.lydia.route.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.QUERY_ALL_PACKAGES

android.permission.ACCESS_NOTIFICATION_POLICY