Malware Analysis Report

2025-01-19 05:51

Sample ID 231220-qey27sghg9
Target b6c115a3579945890f88e9228c334661cfd7568e37299acbad11c0836f71379a
SHA256 b6c115a3579945890f88e9228c334661cfd7568e37299acbad11c0836f71379a
Tags
irata
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b6c115a3579945890f88e9228c334661cfd7568e37299acbad11c0836f71379a

Threat Level: Known bad

The file b6c115a3579945890f88e9228c334661cfd7568e37299acbad11c0836f71379a was found to be: Known bad.

Malicious Activity Summary

irata

Irata family

Requests dangerous framework permissions

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-12-20 13:11

Signatures

Irata family

irata

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Reported

0001-01-01 00:00

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Reported

0001-01-01 00:00

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral3

Detonation Overview

Reported

0001-01-01 00:00

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A