Malware Analysis Report

2024-07-28 11:47

Sample ID 240619-ahpd6stgrr
Target c62648cc00aac1b9bbfcb3e5c3c49348652a2436c1550463764bb781ff16d3b8.bin
SHA256 c62648cc00aac1b9bbfcb3e5c3c49348652a2436c1550463764bb781ff16d3b8
Tags
discovery irata
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c62648cc00aac1b9bbfcb3e5c3c49348652a2436c1550463764bb781ff16d3b8

Threat Level: Known bad

The file c62648cc00aac1b9bbfcb3e5c3c49348652a2436c1550463764bb781ff16d3b8.bin was found to be: Known bad.

Malicious Activity Summary

discovery irata

Irata family

Irata payload

Acquires the wake lock

Queries information about active data network

Reads information about phone network operator.

Requests dangerous framework permissions

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-19 00:13

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to write the user's contacts data. android.permission.WRITE_CONTACTS N/A N/A

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-19 00:12

Reported

2024-06-19 00:16

Platform

android-x64-arm64-20240611.1-en

Max time kernel

3s

Max time network

132s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
GB 142.250.187.206:443 tcp
GB 142.250.187.206:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.179.232:443 ssl.google-analytics.com tcp
GB 142.250.179.228:443 tcp
GB 142.250.179.228:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation6745181322704421790tmp

MD5 93314b008320170c0e2efdea807bed8a
SHA1 eadcdafcbd049d7b4238f2dd3eea09bcb0eabdf4
SHA256 bb9274e59c7b43b770daa6a0b4b36f4bf8ecd9114c3dda87cdd83183e00a7f0a
SHA512 333a1017c837e0325a5a44536adb0aac149e4ca37b13c545b180eec3d4d1e562fd83b62955038dcc67b2470b828e84e7eee879078e2847779dc4d550cd251482

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 00:12

Reported

2024-06-19 00:16

Platform

android-x86-arm-20240611.1-en

Max time kernel

2s

Max time network

142s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.212.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation7943880083964356447tmp

MD5 f5806c2f3679b1b2a5fbd1416f7f77af
SHA1 5ccbef0ea6c165d41f82e578ae5426ea2f95e648
SHA256 a4353becc532a28711452885f9dfb6c23a6b92261502801cf5074c920b6b9adb
SHA512 3bb482b39dc1811c177a4b4ac44eb27607ab52bace3c4fbf1978dc3ed785ef008f691aff0523dd52f9f3a596092af1f02879ca3b99fde63f05bbf8c21dcb07ac

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 00:12

Reported

2024-06-19 00:16

Platform

android-x64-20240611.1-en

Max time kernel

3s

Max time network

134s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 142.250.178.8:443 ssl.google-analytics.com tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 216.58.204.78:443 android.apis.google.com tcp
GB 172.217.169.46:443 tcp
GB 142.250.178.4:443 tcp
GB 142.250.178.4:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation6097407618296402062tmp

MD5 85c6f2f8a084a045ff423ab4e59ed38c
SHA1 c06b3d393b93ec39a8c54a9e4dbd217893e3a742
SHA256 33e4a85682cbc07fe7401c69376714c796b9174d571c169953a137c2a5cb0b71
SHA512 9ef97fde7d025a587081239bb49af4cbd6b56768fedaf889609a43c2da9f1306205fc58c80b24c8cdcbc73cd0847269460d10b8e33c1b3775abd144da75a503f