General
-
Target
example.zip
-
Size
3.2MB
-
Sample
240401-3dc5kahh8z
-
MD5
a2ebe38104822a9b956ff265480e041e
-
SHA1
314a4caf2319bf19dd6d41d7e6e7b40ae99618b7
-
SHA256
94524022cd49a0fc0a8722ad3d368e420b3e120773ed21d12979120f6e9c3ec1
-
SHA512
8eb2f1fe4728ffbc340613a4c640109b467cbf848de85aaffe593aa9cfe5bd32f54528050c41b07b3b6847627186f8a2e7cd8338e3a90e729d2e52f273daa118
-
SSDEEP
49152:1Ex39/QBc/Fumb1eeBGM3iunCC/3ZsCWRT772zxvRKUF9BO1zLSG/fw+L3pQtD6J:cY6Qtey4BstSNhHmzLSu3itD6iL8QOt
Behavioral task
behavioral1
Sample
6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
irata
https://uklivemy.gq
Targets
-
-
Target
6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk
-
Size
3.3MB
-
MD5
b731343b083f999ae0271d19ec92da4f
-
SHA1
05e5da65faf6fadb2a3c8dab2eb3d888ca6fad9a
-
SHA256
6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5
-
SHA512
84bc70e927af425b430b7a79797e5207eb6b8d33892f2b37c80e3f8fcd987a70a8e44dfccbd3b356d98e6ed413ee1dccc42211cbbe4311adb19579db6cd46eec
-
SSDEEP
98304:IEVF6aL7fDW3v0AMYfccAYUMF2yIOcX3i9MNIXcK:I46x3vKcAUGOcGMK
Score7/10-
Makes use of the framework's foreground persistence service
Application may abuse the framework's foreground service to continue running in the foreground.
-
Acquires the wake lock
-
Reads information about phone network operator.
-