Malware Analysis Report

2024-07-28 11:47

Sample ID 240614-tqez9a1gqn
Target base.apk
SHA256 278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

278b1bb652f2bb7297d55f2ab4f4404d28f35fdfa5ceab0fdf66979c99240285

Threat Level: Known bad

The file base.apk was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Requests dangerous framework permissions

Acquires the wake lock

Queries information about active data network

Reads information about phone network operator.

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 16:15

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 16:15

Reported

2024-06-14 16:18

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

159s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation1446671304600205963tmp

MD5 ded946b98692bd583b8692004ab09a3b
SHA1 7ffa96bda55de7aeaee607e26e6884448cbd53b9
SHA256 8ca0cb48c5b32182b2d681040e281bb8a487d852d5ce5ff1a4429daf910ca603
SHA512 4328dc14208585c2994f428dd5c97b6ea6d0c00dc1b058152c2c27c6e47dd54234a791c3f6dabb031fb71b73716d67ae506075179a0ce218e508f16f4dd7c579

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 16:15

Reported

2024-06-14 16:18

Platform

android-x64-20240611.1-en

Max time kernel

3s

Max time network

131s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.16.232:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 172.217.16.226:443 tcp
GB 142.250.178.14:443 android.apis.google.com tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp
GB 172.217.169.46:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation764195435461950362tmp

MD5 aa5c3b95d344f4c769aa1dc9b599f95a
SHA1 dd54bc3e77161dc7a183e1509be7685487d2daa5
SHA256 86834e9ce2833761c687d674d3f166131df8256fd659e084bad2e1388b52aa7e
SHA512 1c31f44bcc1390779ba17eadc9b4ce3486b2082a838f9a4720435e513eee413dc61942cc90371c0c78a39ec560271c20e9492af8008e56d290764acb48f21a5f

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-14 16:15

Reported

2024-06-14 16:18

Platform

android-x64-arm64-20240611.1-en

Max time kernel

2s

Max time network

130s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.10:443 tcp
GB 142.250.200.10:443 tcp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.8:443 ssl.google-analytics.com tcp
GB 142.250.187.238:443 android.apis.google.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation516322845585148756tmp

MD5 508dd78d7988d0f1ef8262405b1733a1
SHA1 568e423c97615e9f33b4f17588b538bf90e63395
SHA256 4df6d8e05fe8f6df8dfcd23bb1ead993fa8468968b2e9c69a36e3a1e15dd02e7
SHA512 b251f9665009f6b8f32eb73cc430b6111c256c334f2687b0781090e7ceeeabf1f43304efd735da791285389998b39072ca3603065c426be663ab755a1ddae046