General

  • Target

    NEAS.b0b2c57915b37687bad9a7848fb142080364d125f6ca2ab803510e26b5a303aeapk_JC.zip

  • Size

    1.8MB

  • MD5

    4f72a718bb1cedf71a296c39ba90e6b6

  • SHA1

    d94c6274a95a187ea581d5daeec0ccfdf55034cd

  • SHA256

    b0b2c57915b37687bad9a7848fb142080364d125f6ca2ab803510e26b5a303ae

  • SHA512

    4d13dcbf05c7a84cd0beccb623b689cf3dde65dd15912179be3fb2fd663f3e8766d6d48783bb4dc3e6904c735a81c78d8d8e9daa68f03203e4f0507ac487d03c

  • SSDEEP

    49152:6s/ikkp7XQoyynd1KCUgB6c8WIRCNpksmako+mEGAV55anq:7ikkpXfnd1kij2Eksmh0cjanq

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • NEAS.b0b2c57915b37687bad9a7848fb142080364d125f6ca2ab803510e26b5a303aeapk_JC.zip
    .apk android

    com.lydia.route

    .main


  • port.txt

Android Permissions

NEAS.b0b2c57915b37687bad9a7848fb142080364d125f6ca2ab803510e26b5a303aeapk_JC.zip

Permissions

com.lydia.route.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.VIBRATE

android.permission.POST_NOTIFICATIONS

android.permission.READ_SMS

android.permission.FOREGROUND_SERVICE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

com.lydia.route.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.QUERY_ALL_PACKAGES

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.READ_CONTACTS

android.permission.WRITE_CONTACTS