General

  • Target

    747d4b0a81b07250de71ebe13a3835dba3a3f095c1b2f5ee1ca18bf47a5f57fc

  • Size

    3.1MB

  • MD5

    99f56b8931fb420e0e0fc569451d5a0a

  • SHA1

    71fcfc5fa0a88dee06e237c69c9a76df30428f6c

  • SHA256

    747d4b0a81b07250de71ebe13a3835dba3a3f095c1b2f5ee1ca18bf47a5f57fc

  • SHA512

    61ca29015552fd0bd630a8b7f9319696b1d3e2b17b4d4d27f77133a69e20c330370c5ca18df67d9fa9fa135003a5bb8f42ef071277a8ad699fded2d1420ba78b

  • SSDEEP

    98304:ay+++++++++++++tmLQ7Qd7IMvQdXZPmDxDZoKXWy:aVXIo+

Score
10/10

Malware Config

Signatures

  • Irata family
  • Irata payload 1 IoCs
  • Requests dangerous framework permissions 2 IoCs

Files

  • 747d4b0a81b07250de71ebe13a3835dba3a3f095c1b2f5ee1ca18bf47a5f57fc
    .apk android

    jomagom.apk.mixto2022

    .main


Android Permissions

747d4b0a81b07250de71ebe13a3835dba3a3f095c1b2f5ee1ca18bf47a5f57fc

Permissions

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.INTERNET

android.permission.RECORD_AUDIO

android.permission.FOREGROUND_SERVICE