General

  • Target

    test.apk

  • Size

    2.2MB

  • MD5

    34721c5a6b1793f472bfab07fb41d5b4

  • SHA1

    4e2081750fb75b829c0d244ff0cb268e1242360f

  • SHA256

    cb546ad31ec33fcfe97146555a66890b0597f723eb3c7fd5e91d84812eeeb56f

  • SHA512

    7adc131ab1668304ccf7fee96f25f30386c79c7b22182b604998f9fa12cde8a679d88b51a1d6217beab356780d98d287113e164798e1f064e127cd1dcef35bab

  • SSDEEP

    49152:GgvYwEB/l2s5aRp6zeYcRH7MOErtiUWtj3cHtRJ:UwEB/lH5amLSHIV0FwtRJ

Score
10/10

Malware Config

Extracted

Family

androrat

C2

192.168.194.130:8000

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • test.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

test.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE