General

  • Target

    52770b424a389e606b326221af03dbe770eac840d4f291f32df3deb6a4fc47db.apk

  • Size

    1.9MB

  • MD5

    946f4da12572cc7370be6ed6778f3854

  • SHA1

    7f6f21471c160eda9af5dbb796a99b410b9bbee6

  • SHA256

    52770b424a389e606b326221af03dbe770eac840d4f291f32df3deb6a4fc47db

  • SHA512

    df753a7f17fb40b51de7e568857e68819c717c905982a17ade6e7d21a8453942daf6fd793c908adea318ebbdbe294198eb4150274bac6427106fd60d8998c807

  • SSDEEP

    49152:k/EZL9zHbY+B0TXud1WB79IKrPWI5RAeuTvKC03T1dy15ltJv:yOL9DbY++Y1k75PFAeavl81dCJ

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://my-admin-sql.org/data/6977722252/rat/140Wa69Z/contact.php?result=ok&action=upload&androidid=

https://my-admin-sql.org/data/6977722252/rat/140Wa69Z/requests.php

https://my-admin-sql.org/data/6977722252/rat/140Wa69Z/sms.php?result=ok&action=upload&androidid=

Signatures

  • Irata family
  • Irata payload 2 IoCs
  • Requests dangerous framework permissions 4 IoCs

Files

  • 52770b424a389e606b326221af03dbe770eac840d4f291f32df3deb6a4fc47db.apk
    .apk android

    Madsal_remote.com

    .main


Android Permissions

52770b424a389e606b326221af03dbe770eac840d4f291f32df3deb6a4fc47db.apk

Permissions

android.permission.INTERNET

android.permission.READ_SMS

android.permission.VIBRATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.FOREGROUND_SERVICE

android.permission.WAKE_LOCK

android.permission.ACCESS_NETWORK_STATE

com.google.android.c2dm.permission.RECEIVE

Madsal_remote.com.permission.C2D_MESSAGE

com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE

android.permission.SEND_SMS

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_SMS

android.permission.READ_CONTACTS