General

  • Target

    1328b5cdbd343cabdc8eecd608093b4a.bin

  • Size

    2.7MB

  • MD5

    edf301a10f0c4762672999cbc855ef25

  • SHA1

    5f1ee50fd27f6a0dd8ef1fe6f59643843deddb1e

  • SHA256

    b9d2aafb801e67d7dc4f0e6990d4e6e3518684ecaa63c40f2523aa7821bc8dc3

  • SHA512

    b8aa9e5610620e3d44b89c8598e3b461449e99a2f93d5a4fde31076bf87472e933b69a3892669de02c454a387c1b3273d1b4638ae6cd20471e5867d7da4add8f

  • SSDEEP

    49152:TjOFJ2iqul4ylN9lxmW0S8fQOiZ2JMGcAEgUueLRWma3lWs336Stl:2J2iqqz4dSmcyJUpLAmPs3KS7

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 1328b5cdbd343cabdc8eecd608093b4a.bin
    .zip

    Password: infected

  • 5894f82211a1bee2cd921a1863671ffd35f9916b769188d251beda28127d0bb8.apk
    .apk android arch:arm64 arch:arm arch:x86 arch:x64

    Password: infected

    org.jet.tellgram

    org.jet.tellgram.MAc


  • baseline.prof
  • baseline.profm