General

  • Target

    NEAS.a2eee8aa7f3402efd3a2211897525604e62b3140737afb427316d02c1c960619apk_JC.zip

  • Size

    1.7MB

  • MD5

    d3a88d14ba47f24914ba276e56761414

  • SHA1

    ee74b16db142550f494c594cbe4366173c2a39eb

  • SHA256

    a2eee8aa7f3402efd3a2211897525604e62b3140737afb427316d02c1c960619

  • SHA512

    32c2f9be1d702a768e057921e31762d22bf588770f0526f62b130e590049b965a01a76fce76e770e514221d36c2c34b22e49b3ccc3f150c2037735a977f5b7f7

  • SSDEEP

    49152:qs/0kkp7XQouzfAz+A2Lrdfc56guyzpNu8z:r0kkpXOfABsBEYgLNu8z

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • NEAS.a2eee8aa7f3402efd3a2211897525604e62b3140737afb427316d02c1c960619apk_JC.zip
    .apk android

    com.lydia.route

    .main


  • getewayport.txt

Android Permissions

NEAS.a2eee8aa7f3402efd3a2211897525604e62b3140737afb427316d02c1c960619apk_JC.zip

Permissions

com.lydia.route.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.VIBRATE

android.permission.POST_NOTIFICATIONS

android.permission.READ_SMS

android.permission.FOREGROUND_SERVICE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

com.lydia.route.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.QUERY_ALL_PACKAGES

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.READ_CONTACTS

android.permission.WRITE_CONTACTS