General
-
Target
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852
-
Size
1.8MB
-
Sample
231013-dg7qxabg5t
-
MD5
473bd3af0b898b23a3faf79bf8bb0389
-
SHA1
49b613fbd3e7cd2e62b913b0a9297decd242b3b4
-
SHA256
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852
-
SHA512
6ffdfe2a0826f49197c6b69141106829340723cd189a6fa669abb5c8a08b330232d58cfcf1690c537642709c477bd3ab993193dacef8d604423ea6e821fdcd50
-
SSDEEP
49152:CU6jDVzOat8p0HPZ9gz2KsoGcQlIh7Q05kACh81LUssOrFN:CU6nVtt8p0vPgsoGcQckACh81oYrFN
Static task
static1
Behavioral task
behavioral1
Sample
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852.apk
Resource
android-x86-arm-20230831-en
Behavioral task
behavioral2
Sample
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852.apk
Resource
android-x64-20230831-en
Behavioral task
behavioral3
Sample
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852.apk
Resource
android-x64-arm64-20230831-en
Malware Config
Targets
-
-
Target
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852
-
Size
1.8MB
-
MD5
473bd3af0b898b23a3faf79bf8bb0389
-
SHA1
49b613fbd3e7cd2e62b913b0a9297decd242b3b4
-
SHA256
c7f19eae9ff56d59c8d9139fcb29fe93a7bad4b6ed66fe82814271465ebbd852
-
SHA512
6ffdfe2a0826f49197c6b69141106829340723cd189a6fa669abb5c8a08b330232d58cfcf1690c537642709c477bd3ab993193dacef8d604423ea6e821fdcd50
-
SSDEEP
49152:CU6jDVzOat8p0HPZ9gz2KsoGcQlIh7Q05kACh81LUssOrFN:CU6nVtt8p0vPgsoGcQckACh81oYrFN
Score10/10-
Irata
Irata is an Iranian remote access trojan Android malware first seen in August 2022.
-
Irata payload
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-