Malware Analysis Report

2024-10-19 13:15

Sample ID 240325-qcfg3sbe81
Target app.apk
SHA256 c907a1ec336853be4dc53fa3d3a73b24d983e098257cbb3d80bd380b6325ca8c
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c907a1ec336853be4dc53fa3d3a73b24d983e098257cbb3d80bd380b6325ca8c

Threat Level: Known bad

The file app.apk was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

Reads information about phone network operator.

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-25 13:06

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-25 13:06

Reported

2024-03-25 13:08

Platform

android-x64-20240221-en

Max time kernel

3s

Max time network

58s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.213.14:443 android.apis.google.com tcp
GB 216.58.204.68:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.200.36:443 www.google.com tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation1400633331409016863tmp

MD5 ac22afe2753bc400a86b47ba77a09e7e
SHA1 c0ee7287251960de4e6945f063074966f72ae372
SHA256 c0c8233928d507ba0d944c5c6f5668c21830d22e5515a8040a6fb8e083b7f1a5
SHA512 b327ad0bd399e27fd30c57d6d7a1a7de92d7359001922295acce38ef7c7e8ccaf85f0dee7924c02f61bb0620b33acba4d462d6bcd72c87eeba0fd5b098d3faa9