General

  • Target

    e12b5bca197dd699a7f7f213be0f0c55

  • Size

    8.9MB

  • MD5

    e12b5bca197dd699a7f7f213be0f0c55

  • SHA1

    5ad92eab1bd7535e6125f0a81d1fff0d6d275285

  • SHA256

    bb718b239a5cd6f160c65ccddf737fa8ed2912005ed733a3489e1f0b3be250ff

  • SHA512

    0d3826b133438e462e09a1296e40b5d2d5af0f102df5c54e402f00237914e2d8067da352a286ea1b417d71f6532d3eab8afae678d3d603f02f66910b6091463a

  • SSDEEP

    196608:6SuVyE0xwIqHLywuGHb3WQVixZtKdxWxmAubE0GFlaZw2ZuCPI5KOZM:wh0xr2LTuGHbGQVgaWxmrbEFnX+u1hZM

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Declares services with permission to bind to the system 1 IoCs
  • Requests dangerous framework permissions 2 IoCs

Files

  • e12b5bca197dd699a7f7f213be0f0c55
    .apk android

    ir.hmh.goldenclock

    .main


Android Permissions

e12b5bca197dd699a7f7f213be0f0c55

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.ACCESS_NETWORK_STATE

android.permission.READ_PHONE_STATE

com.farsitel.bazaar.permission.PAY_THROUGH_BAZAAR

android.permission.RECEIVE_BOOT_COMPLETED