General

  • Target

    301194c66763022c333592d1a985da1d3a0ef3e87f312f532178cc69e81fb528_JC.apk

  • Size

    3.5MB

  • MD5

    d9ad3b14308ebd75ceaa5dcff4178674

  • SHA1

    fc7262ec2a58b098e8664a584a2f9ae6f05fd28c

  • SHA256

    301194c66763022c333592d1a985da1d3a0ef3e87f312f532178cc69e81fb528

  • SHA512

    6b3f08553be9753c20dcbae3645724a9df22f2b7529f946175b5a3f649dc3e7c9375ad3309ef3c53c470be35d6107abcf50d36304a31a61d0741a802789b4fb2

  • SSDEEP

    98304:7SPO6efffnRcj7jGPJqudG8BMSqVauu3kKSz4hz3:7SWXcXgQVaj3tG4hz3

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://uploads.dachhost

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 301194c66763022c333592d1a985da1d3a0ef3e87f312f532178cc69e81fb528_JC.apk
    .apk android

    ir.shz.shzkisi

    .main


  • Toxic-Port.txt
  • lmain.bal
  • url.txt

Android Permissions

301194c66763022c333592d1a985da1d3a0ef3e87f312f532178cc69e81fb528_JC.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

ir.shz.shzkisi.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS