General

  • Target

    743a8dd0c47ef03598ad4e23123d610f.bin

  • Size

    2.9MB

  • MD5

    377b2f87c6fec62c5690d1ba135ccd9a

  • SHA1

    ce49947e282e9968ca227d77fd6a590e8f6fae0d

  • SHA256

    46ecb64d5952e74c871054e8c120b59bb3f346c244596c574c7e41e06d4e1f73

  • SHA512

    81e3458b6d30ab59987c85c9e182cdb03e836535ef7fec0a5184f3b898b3ada9586e0b8a2e825c216c370cb0ef0e596aea81fd74b86c607e274ca15b2ea74ecb

  • SSDEEP

    49152:f+GL9PkxASoJ2430luizCIB/pJh9CU4JXjjc0dn5OwfvZzOp5AgIFR5zIk:f+K9cqSE2438CUe9JzjcGVfvNOp5Ag0

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 743a8dd0c47ef03598ad4e23123d610f.bin
    .zip

    Password: infected

  • 77c884ed5577aaca47dc0ee9152c4831bc6d9142db0ef2329980487b7d1c96b6.apk
    .apk android

    com.lydia.route

    .main


  • getewayport.txt