Malware Analysis Report

2024-10-19 13:16

Sample ID 240402-mb5h2aef5z
Target 01d840496d457504661cf29b0a9bb231411bd83bed375087f80824e4575d139b.zip
SHA256 109d9efc48a9d4b0f80a41968258a666fe36c7a45c6530f1cf72c42e43751d8d
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

109d9efc48a9d4b0f80a41968258a666fe36c7a45c6530f1cf72c42e43751d8d

Threat Level: Known bad

The file 01d840496d457504661cf29b0a9bb231411bd83bed375087f80824e4575d139b.zip was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

Reads information about phone network operator.

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-02 10:18

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:22

Platform

android-x86-arm-20240221-en

Max time kernel

3s

Max time network

136s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation2245630064142796185tmp

MD5 228fd6e6b3de82002aee839ee00ad944
SHA1 d19c888540b679ae833c173c0bd4eca6e7e5440c
SHA256 441096c57e25db4ff9da1bdc09045461f65f28f5e44526a15b5e2e27958fe084
SHA512 3278cbef9c6a9112724e2133e7a24debc819614c596e5f9b7ddf6ccbd90cf6c937e66acab7416456b0d8ae88344e00333169a2e485064231075ff0f86c923c7c

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:22

Platform

android-x64-20240221-en

Max time kernel

4s

Max time network

146s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation1422693057161880260tmp

MD5 88ce9810c623a5a611a2fde01bf6f336
SHA1 4e9a3dee670e3aacc17aac0b24eb60fb8cbceea7
SHA256 9eb334ec6fdda4a12dd16e69480ac87ed233e63c89d0a12fa139f9805e089aba
SHA512 f3d073c3937067334eeb3b495256fdf27379f91a974b28ff176a851cf47e80db62317b8279c15f942a9fc209328314d727cfde386a749f19d9d552c5d6017dcb

/data/data/com.lyufo.play/files/PersistedInstallation921917385153194667tmp

MD5 b69d79e1b4e30b7eff20e464fdceed47
SHA1 225280fe760e4717f58df7f288c2c1e38f961809
SHA256 7bfba64cf24cd709fda2b1458f884bdef58625424d9e281c8a14555f3920736f
SHA512 6070ff75aaa13b94ce40e404345b2643ad86ae1c61561b0fa2fcefab2f2c23e470efbe891a1ec977a0c970542a474b150671d624acf77e2583602c510363bb68

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:23

Platform

android-x64-arm64-20240221-en

Max time kernel

3s

Max time network

133s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
GB 216.58.201.110:443 tcp
GB 216.58.201.110:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.200.14:443 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.46:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.200:443 ssl.google-analytics.com tcp
GB 172.217.16.228:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 142.250.187.228:443 www.google.com tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation6275044085608980800tmp

MD5 f9cd6c63107cf4976cb59d7d8743fdc3
SHA1 3f829ca483c9fce07fa8dd6f4da7cc4b3f630efd
SHA256 341fbda0812e628b99b59e3f89100009aab2f29d3215812c4975136066ff95c6
SHA512 6b5bbb3325adfb925e2fdf159019230dea4227896fc04846e39872c1b92049fe2a5ffdbbb90257df0f10de8902031cf476b96b1352c5a45c75762de959b4b94e