General

  • Target

    80e31cf4b69e4f9ac0769f9a6e0b26ab.bin

  • Size

    2.4MB

  • MD5

    b3e5fa877658a5c6c1613b3cb769b773

  • SHA1

    6dc752b09817820685265e750b5250d8671cf455

  • SHA256

    2ac93df9b9555ea23f2702293c059a33e6ce6413c0b12e31e9976d702303ecf3

  • SHA512

    e62d44d2a3b25e995ed5121e9bb202cdfb5c6d6e8d18ffe98ce81c04b34cdd9edaa7280ab5dc3ceb673a57a69701f0a20e539b04fd6001f548986c2ec4fde3cd

  • SSDEEP

    49152:QKKdk2MqqJqRPoLR7oO6y5sosHjaoMo5MfEQ6BElyeUow9yJf8G3M:zqVRo9ovVHja+gjaoN8

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 6 IoCs

Files

  • 80e31cf4b69e4f9ac0769f9a6e0b26ab.bin
    .zip

    Password: infected

  • 3257f287c754b0492d21a185b579fdbe6c5d3ae7cd599a1adae049eff96d350b.apk
    .apk android

    com.lydia.route

    .main


  • getewayport.txt
  • link.txt
  • number.txt