General

  • Target

    7fa3d58a0056e8492a84894a6fd3b3d0d87ff1f9656f5e54b10580b9a4a4fd6a.zip

  • Size

    4.5MB

  • MD5

    8e526d8c1332ca066bc9969c6c1edff4

  • SHA1

    3a5fa3df568fcde179ea2db795bd8230b8341372

  • SHA256

    08d589322bf236d7d9e7abf392c15d7625e36047ea35d669323612ef15942eea

  • SHA512

    71184dbd7f1f32e041e1a8a006459206aa0d36884603e183980c342ce47477f7e6104fd5f485812ae1e9c257854bc0d8e39a587527a550116927652ac7b6fb46

  • SSDEEP

    98304:UhmmUv5Ohv1IregVlYSj/6Kk5NShXHkbT4w1phHL4pcCfXGTfXY3B:UwmeOhCXllkgydhHecgXGjoR

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Declares services with permission to bind to the system 2 IoCs
  • Requests dangerous framework permissions 20 IoCs

Files

  • 7fa3d58a0056e8492a84894a6fd3b3d0d87ff1f9656f5e54b10580b9a4a4fd6a.zip
    .zip

    Password: infected

  • 7fa3d58a0056e8492a84894a6fd3b3d0d87ff1f9656f5e54b10580b9a4a4fd6a.apk
    .apk android

    Password: infected

    com.caixkdopro.app

    .main