General

  • Target

    test.apk

  • Size

    2.2MB

  • MD5

    6a0757584118a4f7f66df31b023c3b2c

  • SHA1

    26cfaf2b1917006935a41939cc70099ac8c2dacc

  • SHA256

    0db62718e0ac2ce8cb86d208d1a687a9bb453de620b2236521bc2cd65626e30a

  • SHA512

    5ec783ffdafcdce24f83aed07c4f345657b4a4867d619a099dc26d2234f6ef1f9d1336096fa5e59e4665d3b11d05afb060e328cf48dea1c369601ae6ecd742c1

  • SSDEEP

    49152:9rM7sQSgm6ZUp63VW2yzll5J4OV3LszmYQffUrKcgvYma:i4Q3j305V3LsTpKOd

Score
10/10

Malware Config

Extracted

Family

androrat

C2

193.161.193.99:59263

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • test.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

test.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE