General

  • Target

    4b107d860916f039c2e68277a381a2efbb3b1aec514eddc945131ed15f95689a

  • Size

    327KB

  • MD5

    e6a17defa9c205ef1f4774e176ae4e8e

  • SHA1

    f8da1da33de38d436075ff3a15eb920866d5545b

  • SHA256

    4b107d860916f039c2e68277a381a2efbb3b1aec514eddc945131ed15f95689a

  • SHA512

    3011076994a09effc4fd7489b38c2903df0e03d8af0ef9a550ff945b548404b02ef6610eec2eb3f2323ea75bd3da1c98460d39377e36bb0f66607b94ef8bc445

  • SSDEEP

    6144:M0+41srg22P9x9G3Mp0i+Gn0CkZeU7Pm9zShpQJW84fpj7cZsXS29nSQksqyjJD5:MB41Ag2AJG3nU9kFuOFthHcGX99BPj3T

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 1 IoCs

Files

  • 4b107d860916f039c2e68277a381a2efbb3b1aec514eddc945131ed15f95689a
    .apk android

    www.shimlar.com.shimlar

    .main


Android Permissions

4b107d860916f039c2e68277a381a2efbb3b1aec514eddc945131ed15f95689a

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE