General

  • Target

    7dee2bd718931147672c1b3aa77e2719ce0dae5b5295658502b9b67deae4ce2b.bin

  • Size

    4.6MB

  • MD5

    84507928bb0052812d347e9e20c43929

  • SHA1

    d8db28c4a979a76a46f1d01312f73ad2b70ba050

  • SHA256

    7dee2bd718931147672c1b3aa77e2719ce0dae5b5295658502b9b67deae4ce2b

  • SHA512

    8b446715a600c5dfd287ed55a87ced31fe37b5b094cd1f28c1d7be07b166a742f0615feea8cff108313c93364693ed73f84dc9da7125de38e87b4a3783e1adff

  • SSDEEP

    98304:C4uzKrIqT+3PGS97IY4/2mSVYGxC2s+HE73qKxKFJvkHEjxrDvM1:C4uzUHTsTIY62v6iHE7qmKYHEjh0

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://eblaqie.org/pishgiri

https://eblaqie.org/ratsms.php?phone=

Signatures

  • Irata family
  • Declares broadcast receivers with permission to handle system events 1 IoCs
  • Requests dangerous framework permissions 5 IoCs

Files

  • 7dee2bd718931147672c1b3aa77e2719ce0dae5b5295658502b9b67deae4ce2b.bin
    .zip
  • Group3/20F4CD2BAA09E0BD5E12DAB50C0898CD
    .apk android

    com.ilnlhpcoiq.icgsw

    com.ilnlhpcoiq.icgsw.bvxsvak


  • Group3/355cd2b71db971dfb0fac1fc391eb4079e2b090025ca2cdc83d4a22a0ed8f082.zip
    .zip

    Password: infected

  • 355cd2b71db971dfb0fac1fc391eb4079e2b090025ca2cdc83d4a22a0ed8f082.apk
    .apk android

    realrat.siqe.holo

    ir.siqe.holo.MainActivity


  • Group3/7A99B60349703AED3AB28F498320F247
    .apk android

    com.xubnspjqeb.lgtyzwlp

    com.xubnspjqeb.lgtyzwlp.yhepfka


  • Group3/8D0A03981DAA93210E184E7FFF02883C
    .apk android

    com.bwgmvd.pbxvikhr

    com.bwgmvd.pbxvikhr.crzfw


  • Group3/9E9D9A3717EED4D558A3F5EDDB260901
    .apk android

    exts.whats

    .Main