General

  • Target

    app.apk

  • Size

    1.9MB

  • MD5

    6d2a244b9f0f6bebe60b3ece6e54a289

  • SHA1

    0a2f59224c58ef6451507145ddf217dba631771b

  • SHA256

    30ed3d74c98ae9ed141c8ae7a263decef971003199f053bf55676ffe2b1caff4

  • SHA512

    e8c5f670e1ee4e401e28c74c316aed0cef7d5007ce7c3e5eebaf26bba1205cc79cf88c5e57aab499dece08649f7d93392353314590805589c5d223a9c78d9f44

  • SSDEEP

    24576:x/cDcvb6Tpm4AsRiQci7JQBaib5LbX3zj/jEJubhsmqecEZD/INFky6X6XR+XgCi:x/Lb2AZDi7JQMULTr+ub1zZkNFkyvQQ5

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • app.apk
    .apk android

    Mad1sal.com

    .main


Android Permissions

app.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Mad1sal.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS