General

  • Target

    example.zip

  • Size

    3.2MB

  • MD5

    a2ebe38104822a9b956ff265480e041e

  • SHA1

    314a4caf2319bf19dd6d41d7e6e7b40ae99618b7

  • SHA256

    94524022cd49a0fc0a8722ad3d368e420b3e120773ed21d12979120f6e9c3ec1

  • SHA512

    8eb2f1fe4728ffbc340613a4c640109b467cbf848de85aaffe593aa9cfe5bd32f54528050c41b07b3b6847627186f8a2e7cd8338e3a90e729d2e52f273daa118

  • SSDEEP

    49152:1Ex39/QBc/Fumb1eeBGM3iunCC/3ZsCWRT772zxvRKUF9BO1zLSG/fw+L3pQtD6J:cY6Qtey4BstSNhHmzLSu3itD6iL8QOt

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://uklivemy.gq

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • example.zip
    .zip

    Password: infected

  • 6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5.apk
    .apk android

    ir.shz.shzkisi

    .main