General

  • Target

    b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.zip

  • Size

    2.7MB

  • MD5

    5208046c3ecc6c72067732d5eb31228e

  • SHA1

    bd430a8b8fc8d2893217d5626ad5df3da078acb8

  • SHA256

    a07e107788be9d28a5095b135b5a27a4cc62a6ed4a614a88036b8fe0d54e2d60

  • SHA512

    565084b40f881d69af2d295fd48fdf83bd357c3d9f95eb4a3f96dc376220a8e76e86574600ce1ec19b1f8e98b85fda8459c2e218ee04b2e8803973ee6b6eace6

  • SSDEEP

    49152:8f9byqGw0+Zk0B/iRYyEkdvkF+qdLtUPBmfM4bacIBFNMbM8mvy8nBapE9C:uxGt+ZzBiYyEkAfLtE8qNB8bfmPP0

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.zip
    .zip

    Password: infected

  • b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.apk
    .apk android

    Password: infected

    com.mycarroll.app

    .main