General

  • Target

    962f154f9c6a06411f0397b47126c8c0fab27e18beaea11f991060c126a9b7e4

  • Size

    2.2MB

  • MD5

    32301181f469ff0649bf8c9895421a04

  • SHA1

    ac8ecef28be68f07166ef6e3ec073b50758f6666

  • SHA256

    962f154f9c6a06411f0397b47126c8c0fab27e18beaea11f991060c126a9b7e4

  • SHA512

    62b669a5e6a7cbaa4c74124737aed4f6c9f55deb4196d1e578348fe38b532c3e988a3be82c871c6084c629484a9d861fa8427c75ca503cf8edc939355defe4c0

  • SSDEEP

    49152:DqlDq8O6Ej4Nf5mr7xB+j+0K5BYOb/3RC5N:DqlDBNfIvxBE+04Nb/3RON

Score
10/10

Malware Config

Extracted

Family

irata

C2

http://shapark-19.cf/pay/liveSexy?e=fSt5n

http://shapark-19.cf/sms.php?port=fSt5n&phone=

Signatures

  • Irata family
  • Requests dangerous framework permissions 2 IoCs

Files

  • 962f154f9c6a06411f0397b47126c8c0fab27e18beaea11f991060c126a9b7e4
    .apk android

    Caco843.siqe.holo

    ir.siqe.holo.MainActivity


Android Permissions

962f154f9c6a06411f0397b47126c8c0fab27e18beaea11f991060c126a9b7e4

Permissions

android.permission.INTERNET

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.RECEIVE_SMS

android.permission.READ_SMS