Malware Analysis Report

2024-07-28 11:48

Sample ID 240601-wr5cmsae6w
Target base.apk
SHA256 278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285

Threat Level: Known bad

The file base.apk was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

Checks if the internet connection is available

Reads information about phone network operator.

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-01 18:10

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-01 18:10

Reported

2024-06-01 18:13

Platform

android-x86-arm-20240514-en

Max time kernel

3s

Max time network

155s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.227:443 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
GB 142.250.200.46:443 tcp
GB 142.250.180.2:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation1702932091600503029tmp

MD5 c6dba9b636579979d0210192c5989923
SHA1 1b562fa73308055e3306e47280a3f627ffa4813b
SHA256 3bcf6e26b45c5d56d1e98262b88610c1261600fa68778a8d10ee263b50e06b7a
SHA512 885bdf31639b1fc458f546766ad27f7d2b3348176b04c097c3ce365269570a98ae1a9baa078f81dda6de2901f0bed4f45842942cc4e80902aaf8877e358fc6cd

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-01 18:10

Reported

2024-06-01 18:13

Platform

android-x64-20240514-en

Max time kernel

3s

Max time network

145s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.40:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
GB 172.217.16.238:443 tcp
GB 172.217.16.238:443 tcp
GB 216.58.212.226:443 tcp
GB 172.217.16.238:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation1825215905469703352tmp

MD5 96c40d48c74867f7884c6fbedb8c1883
SHA1 7a2ff3369f5ad05f9cdff049d79baaf21a9e6042
SHA256 aee4c86bcac6f68fafb17b1038c68d10ee2cf9d8be3e5bacf8169f7e69050246
SHA512 f4a4ef343f74d7d77cf387ac1138ae68737f6db7a3397c9d39a69029c6d56e696c024f694d643a62d5a8a2815bdb634c0c6fcc207cd545c59676172d63da9e13

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-01 18:10

Reported

2024-06-01 18:13

Platform

android-x64-arm64-20240514-en

Max time kernel

3s

Max time network

132s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.46:443 tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
GB 216.58.201.100:443 tcp
GB 216.58.201.100:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation7090029748812707834tmp

MD5 80ddb9e8ea10424f3a8005489c545fa4
SHA1 1c7a3aceae805c352f031405afef9ea782e6fea8
SHA256 32b5ea09e77d4eb1350d87ce9583e6950536eca038bb368adccf8defc0934969
SHA512 9017a45055cce025ac9f049d54354cba08d3b40a3068e80bc35706dc97d6136b271709da2eb04a11cfa1d01647b0af7aac735b2b102f1e095c9b8503ea4edae1