General

  • Target

    b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.zip

  • Size

    2.7MB

  • MD5

    1b3c388d146b315c8ec5d02c1b122ef1

  • SHA1

    a55239e796874c9d246ba79422454670b1e40316

  • SHA256

    ae8f909c74ab9489ce7e1245389e6e7334bd310f610b26b842078291c27af572

  • SHA512

    4a3952a8227c34098fd1abd4b63f9ba6c296cc58529dd1f15a19db2e96e2a38246c1ebcb31e1a4a6362d969cc1ee2744a267f03c97aa4fc574a40c697e6346d1

  • SSDEEP

    49152:NMrKRp/gEeXlhGyDgZHnLW3XKGOkxMdIGnJi+06N+LmFFijsgr1cKg3Xyu+:NMGRlQP7SHLdk6d0+06EL/dJq+

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 8 IoCs

Files

  • b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.zip
    .zip

    Password: infected

  • b2becb9ae44822f4786e28fc66392763e3e04ee9fd2bb40a8268bcb3b61fa21e.apk
    .apk android

    Password: infected

    com.mycarroll.app

    .main