General

  • Target

    424d474edf0223a49156e126261cf46c.bin

  • Size

    2.4MB

  • MD5

    0ac655c50f935630cc2c794010b9d027

  • SHA1

    1983cfb254bb00ea7c93e11349993a372ebb0ca1

  • SHA256

    c7dd5d02ea40c73db01e6ca2a79c87d62e94408aa6b7004ee05ce9ebecd7d417

  • SHA512

    c3ff4a91a6ebd9df23c98d9f548fea1e58b6ef53370e330dc7bf7bebab925f6be401563e5117db2ff8601f69537aa4387fe28697290d658ac62d6c23f5d8113e

  • SSDEEP

    49152:XGe9P2ATeHSHMubJLqfWLJqYJzTEusbSQZWJS1sJfo0OxMDyl+Qwf:l9OATMqMiqfOwYJzTEup+ufo7xM7rf

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • 424d474edf0223a49156e126261cf46c.bin
    .zip

    Password: infected

  • 6d485906476c519ceafa132d909a522d5eeb6c7368ca35bf05710968a47d9b68.apk
    .apk android

    com.lydia.route

    .main


  • getewayport.txt
  • link.txt
  • number.txt