General

  • Target

    NEAS.c779df4193bd0ea9481199fb606b8b8b48513e1f59f0e4fe1285f874fad25c53apk_JC.zip

  • Size

    1.8MB

  • MD5

    cbc18902f159c1bf4a3a2b62c615a263

  • SHA1

    51ed5cb44ed7f7f7c2685d0ef3196a14b37c9b40

  • SHA256

    c779df4193bd0ea9481199fb606b8b8b48513e1f59f0e4fe1285f874fad25c53

  • SHA512

    36e0d2d1cffa9575b478e668037c8e25b92d559d6d63bfb21d1bd41a71ea9ca2a2d19d7755faf01e3d5231bed74cd3b6f0a96353209be390d37d705fe1140e38

  • SSDEEP

    49152:vs/ikkp7XQojNwE2e0zBTw3kXQ/QKDwUqQ/LHe/kl/gRz:wikkpX9wE2e0zBT2kXQo7AKY/gd

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • NEAS.c779df4193bd0ea9481199fb606b8b8b48513e1f59f0e4fe1285f874fad25c53apk_JC.zip
    .apk android

    com.lydia.route

    .main


  • getewayport.txt
  • link.txt
  • number.txt

Android Permissions

NEAS.c779df4193bd0ea9481199fb606b8b8b48513e1f59f0e4fe1285f874fad25c53apk_JC.zip

Permissions

com.lydia.route.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.VIBRATE

android.permission.POST_NOTIFICATIONS

android.permission.READ_SMS

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

com.lydia.route.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.RECEIVE_SMS

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.QUERY_ALL_PACKAGES

android.permission.ACCESS_NOTIFICATION_POLICY

android.permission.READ_CONTACTS

android.permission.WRITE_CONTACTS