General

  • Target

    app.apk

  • Size

    1.9MB

  • MD5

    51694d01496cf69991fdb38307ce9036

  • SHA1

    35aef68175bb7db5cc28b51ad9242dd05715c5b0

  • SHA256

    c0dda8d579928f0fd1e3e7335940298494a590c60334d0ee420e8e5a9da9329a

  • SHA512

    d576414f6c8854feb03195c40f41bcf891bbaf0e7c49a800d81181e60905d4e85daed06e7701be9653e00c0acdb6fbbd61096a61e10d82ca5524c2c2fbcfb417

  • SSDEEP

    49152:u/6YTpMY/ZCOM6byt7a9sMuptRdReY3XMxfiThE3zfJ:EBVMYxCOZbL93IRjFXU8Y7J

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • app.apk
    .apk android

    markazpay.com

    kisi.com.main


  • lmain.bal

Android Permissions

app.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

kisi.com.permission.C2D_MESSAGEdr

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS