Analysis Overview
SHA256
5e12f105f5f6676b7f8edae93b346f3a9a3968af87c83db0a06d0b72442067ee
Threat Level: Known bad
The file 49f8eb9779b3096ca81339c7a6d3cad6a8fc20b3d91ffe103c19935d330ad0aa.zip was found to be: Known bad.
Malicious Activity Summary
Irata family
Irata payload
Requests dangerous framework permissions
Acquires the wake lock
Reads information about phone network operator.
MITRE ATT&CK
Mobile Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-04-02 10:22
Signatures
Irata family
Irata payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Requests dangerous framework permissions
| Description | Indicator | Process | Target |
| Allows an app to post notifications. | android.permission.POST_NOTIFICATIONS | N/A | N/A |
| Allows an application to read SMS messages. | android.permission.READ_SMS | N/A | N/A |
| Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. | android.permission.READ_PHONE_STATE | N/A | N/A |
| Allows an app to access approximate location. | android.permission.ACCESS_COARSE_LOCATION | N/A | N/A |
| Allows an application to receive SMS messages. | android.permission.RECEIVE_SMS | N/A | N/A |
| Allows an application to send SMS messages. | android.permission.SEND_SMS | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-04-02 10:18
Reported
2024-04-02 10:27
Platform
android-x86-arm-20240221-en
Max time kernel
2s
Max time network
131s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Reads information about phone network operator.
Processes
com.lyufo.play
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | semanticlocation-pa.googleapis.com | udp |
| GB | 172.217.16.234:443 | semanticlocation-pa.googleapis.com | tcp |
| GB | 142.250.187.206:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.187.206:443 | android.apis.google.com | tcp |
Files
/data/data/com.lyufo.play/files/PersistedInstallation7582745017676820250tmp
| MD5 | 527015e9f31c0d74c530966c21b74570 |
| SHA1 | dcef47a00660d7c74646eb33ebc792a1e9cdf136 |
| SHA256 | bee78cfd1d2601a86e9013c4d712ff9ea100be60c3fbfa97bf9041b2741ebfca |
| SHA512 | 009c471796556d45a5b0d98be411344ebf68c0e6847055e697ae2a00e87d565797d2a404123fc5c57d8081d1ba27cee065cd868e08b612f67ea39928dfb8d0b0 |
Analysis: behavioral2
Detonation Overview
Submitted
2024-04-02 10:18
Reported
2024-04-02 10:28
Platform
android-x64-20240221-en
Max time kernel
3s
Max time network
137s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Reads information about phone network operator.
Processes
com.lyufo.play
Network
| Country | Destination | Domain | Proto |
| N/A | 224.0.0.251:5353 | udp | |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 216.58.204.72:443 | ssl.google-analytics.com | tcp |
| GB | 142.250.178.14:443 | tcp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 142.250.178.14:443 | android.apis.google.com | tcp |
| GB | 216.58.212.228:443 | tcp | |
| GB | 216.58.212.228:443 | tcp |
Files
/data/data/com.lyufo.play/files/PersistedInstallation4358814661553254213tmp
| MD5 | 13a29121486a5a6c0ace2affd812fb80 |
| SHA1 | 9aaf3d0acf4daec668c5cc46b742db8d2369698e |
| SHA256 | 7ac128f23571ea9cc06b14bbce2fe4e857219ac43c7433a66706e2dd9102bdba |
| SHA512 | e6a78eb812706b17192a7b82b98f797ed85629526a9af178388f48a597a76a0814978a2f806a1c4f6c9aeb47f221e4a203a096493ead4a7b4a6750fa25b02374 |
Analysis: behavioral3
Detonation Overview
Submitted
2024-04-02 10:18
Reported
2024-04-02 10:28
Platform
android-x64-arm64-20240221-en
Max time kernel
4s
Max time network
134s
Command Line
Signatures
Acquires the wake lock
| Description | Indicator | Process | Target |
| Framework service call | android.os.IPowerManager.acquireWakeLock | N/A | N/A |
Reads information about phone network operator.
Processes
com.lyufo.play
Network
| Country | Destination | Domain | Proto |
| GB | 216.58.201.110:443 | tcp | |
| GB | 216.58.201.110:443 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 142.250.200.10:443 | udp | |
| GB | 142.250.200.14:443 | udp | |
| US | 1.1.1.1:53 | android.apis.google.com | udp |
| GB | 172.217.169.46:443 | android.apis.google.com | tcp |
| US | 1.1.1.1:53 | ssl.google-analytics.com | udp |
| GB | 142.250.187.232:443 | ssl.google-analytics.com | tcp |
| GB | 172.217.16.228:443 | tcp | |
| US | 1.1.1.1:53 | www.google.com | udp |
| GB | 216.58.213.4:443 | www.google.com | tcp |
Files
/data/data/com.lyufo.play/files/PersistedInstallation7638284582759730300tmp
| MD5 | 3e54a5abd49c9d85a5bbf7f26d49acd8 |
| SHA1 | c946352a7c97811d57be323b6ef71bf040cf252b |
| SHA256 | fb8c0ea82767f0569eb051e9b48f6ca4ae75297841ef5a4f9ce8cc299e55c6f9 |
| SHA512 | e140f96fc1ff1d43789b1c24c521154886949ed2f9134be8b0f82990af06cbf06fd497b8c586d54a04229aa66c47817373c00e81fac97aa40da61510b59e1994 |