Malware Analysis Report

2024-10-19 13:16

Sample ID 240402-mb79xsef6w
Target 49f8eb9779b3096ca81339c7a6d3cad6a8fc20b3d91ffe103c19935d330ad0aa.zip
SHA256 5e12f105f5f6676b7f8edae93b346f3a9a3968af87c83db0a06d0b72442067ee
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5e12f105f5f6676b7f8edae93b346f3a9a3968af87c83db0a06d0b72442067ee

Threat Level: Known bad

The file 49f8eb9779b3096ca81339c7a6d3cad6a8fc20b3d91ffe103c19935d330ad0aa.zip was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

Reads information about phone network operator.

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-02 10:22

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:27

Platform

android-x86-arm-20240221-en

Max time kernel

2s

Max time network

131s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.16.234:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation7582745017676820250tmp

MD5 527015e9f31c0d74c530966c21b74570
SHA1 dcef47a00660d7c74646eb33ebc792a1e9cdf136
SHA256 bee78cfd1d2601a86e9013c4d712ff9ea100be60c3fbfa97bf9041b2741ebfca
SHA512 009c471796556d45a5b0d98be411344ebf68c0e6847055e697ae2a00e87d565797d2a404123fc5c57d8081d1ba27cee065cd868e08b612f67ea39928dfb8d0b0

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:28

Platform

android-x64-20240221-en

Max time kernel

3s

Max time network

137s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 216.58.212.228:443 tcp
GB 216.58.212.228:443 tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation4358814661553254213tmp

MD5 13a29121486a5a6c0ace2affd812fb80
SHA1 9aaf3d0acf4daec668c5cc46b742db8d2369698e
SHA256 7ac128f23571ea9cc06b14bbce2fe4e857219ac43c7433a66706e2dd9102bdba
SHA512 e6a78eb812706b17192a7b82b98f797ed85629526a9af178388f48a597a76a0814978a2f806a1c4f6c9aeb47f221e4a203a096493ead4a7b4a6750fa25b02374

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-02 10:18

Reported

2024-04-02 10:28

Platform

android-x64-arm64-20240221-en

Max time kernel

4s

Max time network

134s

Command Line

com.lyufo.play

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Reads information about phone network operator.

discovery

Processes

com.lyufo.play

Network

Country Destination Domain Proto
GB 216.58.201.110:443 tcp
GB 216.58.201.110:443 tcp
N/A 224.0.0.251:5353 udp
GB 142.250.200.10:443 udp
GB 142.250.200.14:443 udp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.46:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.187.232:443 ssl.google-analytics.com tcp
GB 172.217.16.228:443 tcp
US 1.1.1.1:53 www.google.com udp
GB 216.58.213.4:443 www.google.com tcp

Files

/data/data/com.lyufo.play/files/PersistedInstallation7638284582759730300tmp

MD5 3e54a5abd49c9d85a5bbf7f26d49acd8
SHA1 c946352a7c97811d57be323b6ef71bf040cf252b
SHA256 fb8c0ea82767f0569eb051e9b48f6ca4ae75297841ef5a4f9ce8cc299e55c6f9
SHA512 e140f96fc1ff1d43789b1c24c521154886949ed2f9134be8b0f82990af06cbf06fd497b8c586d54a04229aa66c47817373c00e81fac97aa40da61510b59e1994