General

  • Target

    app.apk

  • Size

    1.9MB

  • MD5

    2306915a6fdf61d97de0de8e3de7475a

  • SHA1

    aa23e8614e8040127122e9ed1e3767f087e12584

  • SHA256

    4d902fb20673432b824c46762f7f05548a4559b1b06c798813487da201241ea7

  • SHA512

    cf1e5748c2dda0a816366722da173460fbdbd1dff59a788fc56c878272f12fb4a15985bf3ecf879c5c379f339bf29af8b93ff9af1dbc5acf2e7dc2c340bec253

  • SSDEEP

    49152:5HCgaIzv+GOcYlYlvduwnYsz056bPuxOnv1E/2rbE:5HCgaI6GUKuJ6bWxOntS2vE

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://qxpqxpqxp.xyz/data/7115207473/rat/1XaZY83e/contact.php?result=ok&action=upload&androidid=

https://qxpqxpqxp.xyz/data/7115207473/rat/1XaZY83e/requests.php

https://qxpqxpqxp.xyz/data/7115207473/rat/1XaZY83e/sms.php?result=ok&action=upload&androidid=

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • app.apk
    .apk android

    Mad1sal.com

    .main


Android Permissions

app.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Mad1sal.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS