Malware Analysis Report

2024-07-28 11:46

Sample ID 240602-kejpmagb7x
Target 278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285.apk
SHA256 278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285

Threat Level: Known bad

The file 278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285.apk was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Reads information about phone network operator.

Requests dangerous framework permissions

Acquires the wake lock

Checks if the internet connection is available

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-02 08:30

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 08:30

Reported

2024-06-02 08:34

Platform

android-x86-arm-20240514-en

Max time kernel

3s

Max time network

132s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.3:443 tcp
GB 142.250.180.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
GB 142.250.187.206:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation8764970999709135412tmp

MD5 f269a9dd21f0ccc7399caaef83dfa739
SHA1 d3c8c3cd7d9920ca77b4b95fb10f6617656af58f
SHA256 e1dc72f52b7e590cf6d7a7d1ee5777699ad5953ee68a877bf3c56017db15519a
SHA512 7bfdcf33c1cbbff1614243ef4e67c9d26e91f325cf7f7d7cd93131c0ddb926a03771c153abe199c217ccdf2b11288c3bee1b2e05255a368874b546db59016d38

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 08:30

Reported

2024-06-02 08:34

Platform

android-x64-20240514-en

Max time kernel

4s

Max time network

132s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.212.238:443 android.apis.google.com tcp
GB 216.58.213.14:443 tcp
GB 216.58.212.194:443 tcp
GB 142.250.180.14:443 tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation3245740446294000967tmp

MD5 d56fd6f181fa45d8c466b1ec4de45c1d
SHA1 c51f19dd58d5e1f7a8daa2b7c0bcc14e886a1fe5
SHA256 8a06efc7f21703f37fe5e95a6c86c553c708954af8aa8caed7bfca13ec16921a
SHA512 4e9b854468883b4464c1f76cc95cbe81fba4d40b6bc84300f5a551e6d551b5227bb772161b8d8d0a7c207839af23a7ecd1b571d634509fc70093304fe65fb087

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-02 08:30

Reported

2024-06-02 08:34

Platform

android-x64-arm64-20240514-en

Max time kernel

4s

Max time network

133s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.178.14:443 tcp
GB 142.250.178.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.206:443 android.apis.google.com tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 142.250.187.196:443 tcp
GB 142.250.187.196:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation4716451153387969323tmp

MD5 7bb5d214d83601841baaeb38b7ce84a9
SHA1 f54484ff492653d7c2ba9c8acc34af979d7788d7
SHA256 7adc7c4bab997338a62054c65e7d07cc5de0fd42b2100c59e986cf661998d84f
SHA512 38628437e3f24103b84598d3278ef34ad519627f0134d09f89538a93f88f9c310fa26ee8e33150156951f801f081d07c6e35ba8430579d42141bdf754fe0444c

/data/data/com.temptation.lydia/files/PersistedInstallation6245016088099783946tmp

MD5 be7003a150bbde347281a289e5788176
SHA1 b8496a0c766c0e0637278d42e1930464471107f4
SHA256 1d9a73410633bdbd0e30476c4fa93e241d68c42ca2230472562d121881d2dd51
SHA512 f754ed4f9d3e7d424ef6d9085c28084c9f2eaaca9d22e9116f7356206b0356a6dfbbfe24a4f2f5844858d8c318b2c8bc1b4ea2691d3cc5f9d24fce692276b3a5