General

  • Target

    a7b256909f6f34018e1e6bf727df227e531f56cd3fd10ef354325a4009f01b75

  • Size

    2.0MB

  • MD5

    129ba74ddb3772c7d7fe2d2b6d95ee59

  • SHA1

    7046e479e190dc2b1f904ca295b49b4525a85861

  • SHA256

    a7b256909f6f34018e1e6bf727df227e531f56cd3fd10ef354325a4009f01b75

  • SHA512

    ef2a17de1ff48391c090890d3b532558bbe2eb18d6b576e18e893b2dc7de28bbcb2f6fcb13ada62e5816f627e3a6542ca52ad3f803c4c8a25adc1de92a86381e

  • SSDEEP

    49152:nMWhguMUzFBZ53JTeCtxLmg3C94ZN627oPQj+/vgN4xLvd:nMWWl4753sCPd3C94ZN627oS+/vgN4vd

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://samanld.ga/data/35808/index.php

https://samanld.ga/data/35808/sms5.php?phone=

Signatures

  • Irata family
  • Requests dangerous framework permissions 2 IoCs

Files

  • a7b256909f6f34018e1e6bf727df227e531f56cd3fd10ef354325a4009f01b75
    .apk android

    Caco333.siqe.holo

    ir.siqe.holo.MainActivity


Android Permissions

a7b256909f6f34018e1e6bf727df227e531f56cd3fd10ef354325a4009f01b75

Permissions

android.permission.INTERNET

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.RECEIVE_SMS

android.permission.READ_SMS