Malware Analysis Report

2024-07-28 11:47

Sample ID 240627-a3333atbke
Target edlir.apk
SHA256 ba52d0bd1826ecaf674d68130b209e86e4297a831b181e95a9da16a4ff838772
Tags
irata discovery
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ba52d0bd1826ecaf674d68130b209e86e4297a831b181e95a9da16a4ff838772

Threat Level: Known bad

The file edlir.apk was found to be: Known bad.

Malicious Activity Summary

irata discovery

Irata family

Irata payload

Queries information about active data network

Reads information about phone network operator.

Requests dangerous framework permissions

Acquires the wake lock

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-27 00:45

Signatures

Irata family

irata

Irata payload

Description Indicator Process Target
N/A N/A N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an application to receive SMS messages. android.permission.RECEIVE_SMS N/A N/A
Allows an application to send SMS messages. android.permission.SEND_SMS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-27 00:45

Reported

2024-06-27 00:48

Platform

android-x86-arm-20240624-en

Max time kernel

2s

Max time network

131s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.204.78:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.14:443 android.apis.google.com tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation9198797829100409988tmp

MD5 ed87e5464351cf4b1740bd0b43347fa1
SHA1 76237882e6f5bd2aabe1b01d67c328be05f87292
SHA256 f91bdc7c8c391661d8ff1c2390ff2643d3ee28a8183472c3f792bda1ab13765c
SHA512 20c8b05c83a99551f37a61e5bd810e73513202efea652d767ddd1218ce6ab3390defa204cff1b662955aead03b4820cdbafeee9096de92adf5f42516de073b4a

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-27 00:45

Reported

2024-06-27 00:48

Platform

android-x64-20240624-en

Max time kernel

3s

Max time network

135s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 216.58.204.72:443 ssl.google-analytics.com tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
GB 142.250.180.4:443 tcp
GB 142.250.180.4:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation8768725901317346992tmp

MD5 0580c73931d7c335bbb378e566768382
SHA1 408bc3e735f8ccd67a1a6f6ceaae0c8bead15cd3
SHA256 ad190e3d6410aa65e7067e78eafe721025f541f04554053b1a7f1c0ef2712830
SHA512 5dca7b9c9e0da84d7fc8a604c622da97e745dde36f2dbc718ffb986ab1772964829f4b5c711af25f3ccee91a27448d6cbcd332dd01d002c54a8f9d069c6b0ba1

Analysis: behavioral3

Detonation Overview

Submitted

2024-06-27 00:45

Reported

2024-06-27 00:48

Platform

android-x64-arm64-20240624-en

Max time kernel

3s

Max time network

132s

Command Line

com.temptation.lydia

Signatures

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Reads information about phone network operator.

discovery

Processes

com.temptation.lydia

Network

Country Destination Domain Proto
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
GB 142.250.180.14:443 tcp
N/A 224.0.0.251:5353 udp
GB 216.58.213.10:443 tcp
GB 216.58.213.10:443 tcp
US 1.1.1.1:53 ssl.google-analytics.com udp
GB 172.217.169.8:443 ssl.google-analytics.com tcp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp

Files

/data/data/com.temptation.lydia/files/PersistedInstallation7805327765083705336tmp

MD5 3b4a08eca2818fb3bc6af6653a287fc2
SHA1 9818301e7d9dcde7a61f18e3e902f53c9d63020b
SHA256 78657d06d6d2a679646529cf49c71ac5410b31fb92f27dfc1e3d1d698ec038c8
SHA512 977eb5306357311c674f8cf7743a792319f8f34583c4f202dedd2e205648333b4a210cc801f257b7644f6806ac564f1d61d36e0f5b0e55792f9c9e8e755d2452