General

  • Target

    app.apk

  • Size

    1.9MB

  • MD5

    6eb2e41580e2b7af2635bdb8cd268510

  • SHA1

    1df328a485f5089f6a9d04f4616a8fdbb3599337

  • SHA256

    55f1566e004d9af1edae72ba715ed245e76fffbc5e627da8170c2fe699ac66f7

  • SHA512

    3f66198bc8e9f87547efa9c3d1b7e2aa6268776061bc6ff1e7a2db050a6a5eece24a2bed9a7efd1d88016683d38f03477999edefabf29266e039bd0ced660e2d

  • SSDEEP

    49152:C/GgOtcgT/PZ3sbejpF41hoDroBRh6esH5k2nuRDM:YtOt3TJsaVF4HovoE5eK

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • app.apk
    .apk android

    Madsal.com

    .main


Android Permissions

app.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Madsal.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS