General

  • Target

    0fe9ef9ffbce48b357af9b2cc1edd934.bin

  • Size

    3.0MB

  • MD5

    c2148240faedd667731cd069e9de20da

  • SHA1

    030824db02dfdbcb8e6b4f4c5179abdc8933feb4

  • SHA256

    14aae5d1f8b363ef13f30f2dec3bdd7f588c5f59e43802945f4bb320b432c10d

  • SHA512

    f6b06087bdb18bf7c8960d7c34d95debb2cc913bab4f10010905eadb315415849d05d22e2fcf77ab92e4052f00a698d9bff3f1a208fa2a1d2e71e1b0ab9e140e

  • SSDEEP

    49152:EkAnMxll7tXl6g4rpn4b0rhE4EkLRYMMpfLS8bxlPJd22EQjH5dBGi1gxbGb8uss:EdMxlxtEprd5hExkNYvmMlPJdhEO5dYc

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 7 IoCs

Files

  • 0fe9ef9ffbce48b357af9b2cc1edd934.bin
    .zip

    Password: infected

  • a4b485eda4f26a832800790fef33813ecab2de8e8200d0c334ff64b843fcb03c.apk
    .apk android

    com.lydia.route

    .main


  • background.png
    .jpg
  • getewayport.txt
  • iransans.ttf
  • link.txt
  • lydiateam.bal
  • menu.bal
  • number.txt
  • ranstext.txt
  • saham.png
    .jpg