General

  • Target

    test.apk

  • Size

    2.2MB

  • MD5

    06c11d7d7c2a8ac9a7fa911ffb8efc72

  • SHA1

    37b72445ac6b74499e7f5e4e3296ae3835e12e49

  • SHA256

    b6c2b35aeea43f6ee5c3b11aa807643d81e6337be1d1b9c65ba64499cb74d307

  • SHA512

    271139292cda48601b02fadc6cf8b57363edca309255e559057947f5e063b9613899e1752999aec906f82eeefbeaddde8988ac96b102ea5380a2c7c533026f39

  • SSDEEP

    49152:O9DOffLFPsWboMSP2iNQdBMMlYgvYWSkwtqS9jQ:+DyLrbo5CdBJlCXqSFQ

Score
10/10

Malware Config

Extracted

Family

androrat

C2

192.168.205.128:4444

Signatures

  • Androrat family
  • Requests dangerous framework permissions 9 IoCs

Files

  • test.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

test.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE