General

  • Target

    18384934041.zip

  • Size

    3.2MB

  • Sample

    240804-bl7wcswdrd

  • MD5

    ce6eb75fe641b52b492f653745e220a7

  • SHA1

    e8a2d40b197bf25224239e69d8986917d0c7c878

  • SHA256

    97b58fc8798526bfea35ed6ff26272263d332554a75672a3bc54a0a56cbafee3

  • SHA512

    714f15effecec4513fb669304e6ccdb8187aa46a356105b4aebcd553a6528d1eefeb195aff29799dcfaee866b234df27009cea534c08d7e4634b5fb18fe0a238

  • SSDEEP

    98304:H5A4NxTJVmLwQsISdYT6hoPNT75l0fx+oUtS:H5AonmwLX4FH5l0fxGS

Malware Config

Extracted

Family

irata

C2

https://uklivemy.gq

Targets

    • Target

      6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5

    • Size

      3.3MB

    • MD5

      b731343b083f999ae0271d19ec92da4f

    • SHA1

      05e5da65faf6fadb2a3c8dab2eb3d888ca6fad9a

    • SHA256

      6461851c092d0074150e4e56a146108ae82130c22580fb444c1444e7d936e0b5

    • SHA512

      84bc70e927af425b430b7a79797e5207eb6b8d33892f2b37c80e3f8fcd987a70a8e44dfccbd3b356d98e6ed413ee1dccc42211cbbe4311adb19579db6cd46eec

    • SSDEEP

      98304:IEVF6aL7fDW3v0AMYfccAYUMF2yIOcX3i9MNIXcK:I46x3vKcAUGOcGMK

    • Acquires the wake lock

    • Makes use of the framework's foreground persistence service

      Application may abuse the framework's foreground service to continue running in the foreground.

    • Queries information about active data network

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks