General

  • Target

    ed321d72e41b83e5f4c3eaaeef0132d0.bin

  • Size

    2.5MB

  • MD5

    d11dabaf578b23897a96f340224fe3bc

  • SHA1

    ec1c611f985273113b76d11c987c298f9f8805dc

  • SHA256

    58dd73562b0092370b28c6781f6da7e6e70c1d0b8d727f167cea01a8280ae7fd

  • SHA512

    77cb7085257625dcc98406ba4cc834ed8de76b97a6b1b21c06d123d24490892a161ece8b1cd24af27ac168ada9509f888ecdf88e29d6f44d4a21b54a2f8a07c5

  • SSDEEP

    49152:IHkq5lV0sY6d6Bomht+8IQmrf0Szloq5Zy/evWFamvQrM9HPNx0Q8lnC:eksVBY6d6gQMcSzlh4evVgNr0lNC

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • ed321d72e41b83e5f4c3eaaeef0132d0.bin
    .zip

    Password: infected

  • 61f10e51cf2bcdefdac3165e5e7c9e11475d9102e9c541b8680230dfd740106f.apk
    .apk android

    com.lydia.route

    .main


  • getewayport.txt
  • link.txt
  • number.txt