General

  • Target

    base.apk

  • Size

    1.9MB

  • MD5

    f2264b6882d9deef460bbb8e50afa997

  • SHA1

    28e6d13831210b432ed2d9264fda3ebb9935f2db

  • SHA256

    53ec87649e2e1bd7435f32f2dda995c5abbb09c7f3b4450177a48b2326f4a358

  • SHA512

    5e8a1ba74eff3ab21ca7c85364e3b7eccbec2192d37a1372f2bef2f97a55cbe3dec800f5912cf7c29813a69ee9a4bdb7e83c3980b0837ba3d90eee30a4a5f05c

  • SSDEEP

    49152:G/Lb4Dz/r/7rdJQqNA5/bMXartqW19gyXTmP81jJ55wOmDIC:8P4Dz/r/7rgjMXry9ZjmP81b5YIC

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • base.apk
    .apk android

    Mad1sal.com

    .main


Android Permissions

base.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Mad1sal.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS