General

  • Target

    dae48653369bba6efdd7e00ff8da3afc.bin

  • Size

    2.9MB

  • MD5

    6799abba6af590294acf5418370c4d96

  • SHA1

    78bb0709214f44df2243edc841f6b876c6584575

  • SHA256

    133b08a4ea873374198976d38029de7d3aa26d25252e1765ba2e8bd2960fde4c

  • SHA512

    7bf06da4222edc5bb6abb5cb535d87f3dfc9a9b204fa98596d3895dbc160fd6202b6e88db7778745a4e30de549af49c7c5dcc68668007f069e700e8b0590bd6a

  • SSDEEP

    49152:nwqiN3Zg6Vp2hQU8klM9frOZoLGiVkp2ATljJgi6xCaMWs22Dbk:xiNprVp2KUvlM4aGb0AQ2a1GY

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • dae48653369bba6efdd7e00ff8da3afc.bin
    .zip

    Password: infected

  • bda86ba9f504df73e9d57972329dc9a46fd1f1b300978ed1a7ebfcbdaa9a89a0.apk
    .apk android

    com.lydia.route

    .main


  • getewayport.txt