General

  • Target

    Mad-rat.apk

  • Size

    1.9MB

  • MD5

    fc1717dcb2b85501d6af3f2c15f681fb

  • SHA1

    5295f93df913e307bfe451bdf5c795bd5ef291b7

  • SHA256

    8b1660cc87654e10f3809b0eed81c25382b94c7962da1d896614d5ef113e5e80

  • SHA512

    dadb9d60e58bc49a381b9f0eed999918ddb966da9f90ec33cc7a4f566dfa01422fa987add83b0d88bd54500fe15dcf02c6c18d99c4f7064100719e37d74357b1

  • SSDEEP

    49152:r/TbgckgdPw3kv+GDCjoOXHO5NQEVhD0UYrjPt3Y:zHgckgVw3XG+EZ5NQEV90FY

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • Mad-rat.apk
    .apk android

    Mad1sal.com

    .main


Android Permissions

Mad-rat.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Mad1sal.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS