General

  • Target

    776f7e5a07691ae3bf4462b602ba02d04c3388cd05eeee425b5bb8c32e4878a4

  • Size

    4.1MB

  • MD5

    5fc99e153f731d27ecc78bc617491232

  • SHA1

    857da5b4c1a5725b101ec6209569a194126cac33

  • SHA256

    776f7e5a07691ae3bf4462b602ba02d04c3388cd05eeee425b5bb8c32e4878a4

  • SHA512

    060fd74131e869920fd25cda81d55e7c3577b94f26c1930d548eafb882a9f422c7f42cd52afd2021624913b7a9648c707e59d4783d23acea1d07cceeaa99af5d

  • SSDEEP

    98304:JqKFO44mmtRR8A+BjDgfyZy9y7yqygy/ySywykyXyPyNyEyuyq:JqKFO44mmtRRgBL

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://cerpton.cu.ma/S.php?phone=

https://hamsar-yab-ir.ga/index1.html

Signatures

  • Irata family
  • Requests dangerous framework permissions 2 IoCs

Files

  • 776f7e5a07691ae3bf4462b602ba02d04c3388cd05eeee425b5bb8c32e4878a4
    .apk android

    realrat.siqe.holo

    ir.siqe.holo.MainActivity


Android Permissions

776f7e5a07691ae3bf4462b602ba02d04c3388cd05eeee425b5bb8c32e4878a4

Permissions

android.permission.INTERNET

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.RECEIVE_SMS

android.permission.READ_SMS