General

  • Target

    eblagh.apk

  • Size

    2.4MB

  • MD5

    8384ef6b5dab233bc8e6b6bc66e2fef2

  • SHA1

    397d93ed0bbc48dd45b0f4380f45d742fb0fa1c4

  • SHA256

    f8055897862d1acb5f223e2590480d3611d27211f42a14095e3b61a262adf468

  • SHA512

    e7305471f7e48dd07c0deb58a7d80eb09e74b6fee2f8d978a6c1044643b161d00c5aa6eccd9129731a32da588492a36e7b5a747bd10c3cfa9e439895d6ce2fb0

  • SSDEEP

    49152:4oT4YaxL0WP0MRORIZuFJKCCPOFkLpvcKHmlGD+SKNl:pkYYQS00ORIUFaPOFRKGlA+SEl

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • eblagh.apk
    .apk android

    remote.toprat

    .main


Android Permissions

eblagh.apk

Permissions

remote.toprat.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

android.permission.INTERNET

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_SMS

android.permission.SEND_SMS

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.FOREGROUND_SERVICE

com.google.android.c2dm.permission.RECEIVE

com.google.android.gms.permission.AD_ID

remote.toprat.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.RECEIVE_SMS

android.permission.CHANGE_NETWORK_STATE

android.permission.READ_CONTACTS