General
-
Target
Application.apk
-
Size
1.9MB
-
Sample
240428-26tgksbe54
-
MD5
1f5c2daab9da9349c61abe950c661aba
-
SHA1
6da1a8574e1cd927a139c7be328b867c243070d5
-
SHA256
7e4143dd27644a0aedc66130c2a0a56e7aa556e75135f2c6a40c1106228e3fad
-
SHA512
cea9bc240975e13c373125dfe83ea6aed144f11e7935282669a74843b464d8fc2def552c07e48286a69b2350182ba644fbe994cec546fc52dd857c5bfabadb6c
-
SSDEEP
49152:9//SRcduCkmkYwPxtlOHiPJ+PSD/yS+0VTWtHubvw8wiOZSmKIM7:VKR8uCbkX5ss0PSD6ECtObvXwiO4N7
Behavioral task
behavioral1
Sample
Application.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
Application.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
Application.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
irata
https://vahidtried.nitrocp.site/wa//contact.php?result=ok&action=upload&androidid=
https://vahidtried.nitrocp.site/wa//requests.php
https://vahidtried.nitrocp.site/wa//sms.php?result=ok&action=upload&androidid=
Targets
-
-
Target
Application.apk
-
Size
1.9MB
-
MD5
1f5c2daab9da9349c61abe950c661aba
-
SHA1
6da1a8574e1cd927a139c7be328b867c243070d5
-
SHA256
7e4143dd27644a0aedc66130c2a0a56e7aa556e75135f2c6a40c1106228e3fad
-
SHA512
cea9bc240975e13c373125dfe83ea6aed144f11e7935282669a74843b464d8fc2def552c07e48286a69b2350182ba644fbe994cec546fc52dd857c5bfabadb6c
-
SSDEEP
49152:9//SRcduCkmkYwPxtlOHiPJ+PSD/yS+0VTWtHubvw8wiOZSmKIM7:VKR8uCbkX5ss0PSD6ECtObvXwiO4N7
Score7/10-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-