General

  • Target

    d7fd31ce2e0b35c0b434f18c166d5aae70f2f699925fa16196857594d9e362e8

  • Size

    2.4MB

  • MD5

    7faf55cf2784ed36778826c4abe4754a

  • SHA1

    86ffa59b7e2d67df3e2882bd251ea08772e18b24

  • SHA256

    d7fd31ce2e0b35c0b434f18c166d5aae70f2f699925fa16196857594d9e362e8

  • SHA512

    245bd358c262e9a6a5ad25b2676d0761d046c60ab300ed0ce99d3ab336286bb53f0619f2fa37e100e429e31b254c2bb1ed166ceae2ba95fedaae7a729a94538b

  • SSDEEP

    49152:pW6c474NJOOb9K8dSMTf5pQX/089URMrohdAqWJmrKwwmj6rc:M6c47oB9KuVGX/0r39mwwmD

Score
10/10

Malware Config

Extracted

Family

irata

C2

https://eblaqie.org/pishgiri

https://eblaqie.org/ratsms.php?phone=

Signatures

  • Irata family
  • Requests dangerous framework permissions 2 IoCs

Files

  • d7fd31ce2e0b35c0b434f18c166d5aae70f2f699925fa16196857594d9e362e8
    .zip

    Password: infected

  • 355cd2b71db971dfb0fac1fc391eb4079e2b090025ca2cdc83d4a22a0ed8f082.apk
    .apk android

    realrat.siqe.holo

    ir.siqe.holo.MainActivity