Malware Analysis Report

2024-09-09 16:13

Sample ID 240417-bnz9asbb5y
Target 3d5dd6660a6c659fad85268a0a8002905b061ab015e129f3d2da817d010da57a.apk
SHA256 3d5dd6660a6c659fad85268a0a8002905b061ab015e129f3d2da817d010da57a
Tags
irata
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3d5dd6660a6c659fad85268a0a8002905b061ab015e129f3d2da817d010da57a

Threat Level: Known bad

The file 3d5dd6660a6c659fad85268a0a8002905b061ab015e129f3d2da817d010da57a.apk was found to be: Known bad.

Malicious Activity Summary

irata

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-17 01:18

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 01:18

Reported

2024-04-17 01:21

Platform

android-x86-arm-20240221-en

Max time kernel

2s

Max time network

131s

Command Line

app.Madsal.org

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Processes

app.Madsal.org

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.250.179.142:443 android.apis.google.com tcp
GB 172.217.169.10:443 tcp

Files

/data/data/app.Madsal.org/files/PersistedInstallation2419027203077020956tmp

MD5 b2b9d46381e47a7499f80c4cef064ad4
SHA1 84fab48fbfd38eb871d2b7b8516a524ae9bfab34
SHA256 77317ace1923032364814eabd5019953f4e71e77f5d70a5da49577fd40d72b19
SHA512 c2beb924c8e554b3e7b3d606fc353ed2c282067ec6c1afbfa740bbaf558219215249bf1263ceef689396bbabbac7732d6b6cdb4b6d475363ff1320f6a48d53b3

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 01:18

Reported

2024-04-17 01:21

Platform

android-x64-20240221-en

Max time kernel

2s

Max time network

155s

Command Line

app.Madsal.org

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Processes

app.Madsal.org

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
NL 142.250.179.136:443 ssl.google-analytics.com tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.250.179.142:443 android.apis.google.com tcp
GB 142.250.180.10:443 tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
GB 142.250.179.234:443 tcp
GB 142.250.200.2:443 tcp
GB 142.250.179.238:443 tcp
GB 142.250.179.234:443 tcp

Files

/data/data/app.Madsal.org/files/PersistedInstallation2761091379254490820tmp

MD5 3e71a00131b7cddaa9bca6c8f2397631
SHA1 82752d1ef40ff20c9643c948aa08f60e3674ced1
SHA256 3da5241e4dfb0974d6065b506c2d2a42ee97e4e1c8f88b80c20804ca8e9ca77d
SHA512 e5bf7f0d174a1ee16ebf0ff4d6229f6c19c47e4cc76f3f49d51df35a6ab9afdd8c9ad3b79ca1bf08debe5e0d84e2035a1b3f57285d73b386b71846946504eff1

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-17 01:18

Reported

2024-04-17 01:21

Platform

android-x64-arm64-20240221-en

Max time kernel

2s

Max time network

141s

Command Line

app.Madsal.org

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Processes

app.Madsal.org

Network

Country Destination Domain Proto
GB 142.250.200.14:443 tcp
GB 142.250.200.14:443 tcp
GB 142.250.200.14:443 tcp
GB 142.250.180.10:443 udp
N/A 224.0.0.251:5353 udp
GB 216.58.213.14:443 udp
US 1.1.1.1:53 android.apis.google.com udp
NL 142.250.179.142:443 android.apis.google.com tcp
GB 172.217.169.42:443 tcp
GB 172.217.169.42:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
NL 142.251.36.40:443 ssl.google-analytics.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
GB 172.217.169.42:443 tcp

Files

/data/data/app.Madsal.org/files/PersistedInstallation2711516861279130499tmp

MD5 e59a19b77e76e20550c813e32583843e
SHA1 4bb705d5273974170d550e349fef5a0a3d3f7d23
SHA256 86e6f9a4e08e0dc210649982d91044c43d8ed49ea46627318333899c7a7ac310
SHA512 c6d658aff4124ec53ecc1f043f07706d133447a75a1546677bb33c73a067fa50ac0f96a14bd716691f41c783962a038d73594c43d60fb720398d23981eec9315