General

  • Target

    undanganapk.zip

  • Size

    2.2MB

  • MD5

    ccdc840a6e6237d6825dfbd264840abc

  • SHA1

    87bd1abc58fa9815f911cb7b57666d07448254fe

  • SHA256

    f40c752b07e137e4ed72e36ae5cade38231f8ceb20260aa6cc7683272d85dec7

  • SHA512

    1fb5c1c8ecf4063293a28765195fade4336c3b7348d0b3d7210edbb03c156efc1ba9efcaf4980168c43a55344dde12aab616b8efe10099a7503864d4c17c4526

  • SSDEEP

    49152:mgvYb9T38n9bD5sPL/Qx6gv0pSdQcEGL6lRYEnYAgLPxNzcP:0bQ9bD5CLi0pSNEKeRYCtgLPXAP

Score
10/10

Malware Config

Extracted

Family

androrat

C2

192.168.194.130:8282

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • undanganapk.zip
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

undanganapk.zip

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE