General

  • Target

    example.zip

  • Size

    3.2MB

  • Sample

    240401-3dc5kahh8z

  • MD5

    a2ebe38104822a9b956ff265480e041e

  • SHA1

    314a4caf2319bf19dd6d41d7e6e7b40ae99618b7

  • SHA256

    94524022cd49a0fc0a8722ad3d368e420b3e120773ed21d12979120f6e9c3ec1

  • SHA512

    8eb2f1fe4728ffbc340613a4c640109b467cbf848de85aaffe593aa9cfe5bd32f54528050c41b07b3b6847627186f8a2e7cd8338e3a90e729d2e52f273daa118

  • SSDEEP

    49152:1Ex39/QBc/Fumb1eeBGM3iunCC/3ZsCWRT772zxvRKUF9BO1zLSG/fw+L3pQtD6J:cY6Qtey4BstSNhHmzLSu3itD6iL8QOt

Malware Config

Extracted

Family

irata

C2

https://uklivemy.gq

Targets

    • Target

      6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk

    • Size

      3.3MB

    • MD5

      b731343b083f999ae0271d19ec92da4f

    • SHA1

      05e5da65faf6fadb2a3c8dab2eb3d888ca6fad9a

    • SHA256

      6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5

    • SHA512

      84bc70e927af425b430b7a79797e5207eb6b8d33892f2b37c80e3f8fcd987a70a8e44dfccbd3b356d98e6ed413ee1dccc42211cbbe4311adb19579db6cd46eec

    • SSDEEP

      98304:IEVF6aL7fDW3v0AMYfccAYUMF2yIOcX3i9MNIXcK:I46x3vKcAUGOcGMK

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Acquires the wake lock

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks