General

  • Target

    9d57a23bb911dd197ba23601f2bfc617c09c91f40bae9b6e6deb6bdab9f4b65c

  • Size

    1.7MB

  • MD5

    d7998945ec0acc4654240c6d1897816e

  • SHA1

    85494fb4b6e2cf72719bad3955a5d75fd94a723a

  • SHA256

    9d57a23bb911dd197ba23601f2bfc617c09c91f40bae9b6e6deb6bdab9f4b65c

  • SHA512

    4c7ee247b060965aafa2c290cb50106e4f0f51e6c65d5c3c09b56691d6b598b098a4ea2b58c21353a88d076e9abc9a4ebbdebcdf3b663f126f305d68f10d6ea1

  • SSDEEP

    49152:TKlOvALKHWH7W56kzrcTA3kaoOhXj+vegLQyYH:YOvALKHWH7W5eA3iOZ+mgLm

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://ir-starka.cf/58656/sighe.php

https://ir-starka.cf/58656/sms.php?phone=

Signatures

  • Irata family
  • Requests dangerous framework permissions 2 IoCs

Files

  • 9d57a23bb911dd197ba23601f2bfc617c09c91f40bae9b6e6deb6bdab9f4b65c
    .apk android

    Caco333.siqe.holo

    ir.siqe.holo.MainActivity


Android Permissions

9d57a23bb911dd197ba23601f2bfc617c09c91f40bae9b6e6deb6bdab9f4b65c

Permissions

android.permission.INTERNET

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.RECEIVE_SMS

android.permission.READ_SMS