General

  • Target

    system.apk

  • Size

    2.2MB

  • MD5

    0b8fa481a40dea489c019ffe85c3dd7e

  • SHA1

    24c9eb572d3fcc8727ef3d0bb4a58bbccba702b8

  • SHA256

    7eb00f9351a7a2caeefdaa172288c2ae77922407c88f4f517884a600d3ea812f

  • SHA512

    e18d8ba908765ed2e15528d563c5902c9544d9336ec4a6cfe13174c42b15c46f437e9f0718a7af786374079ded2444b0fff5aa4d941972911fe654674b96d41b

  • SSDEEP

    49152:kgeFnfKo5c6ZXSbArvhlywS4zF64kC1apeR7kvgvYfsr:kg2n35hSMv3yN4zF6nC1/kT0r

Score
10/10

Malware Config

Extracted

Family

androrat

C2

176.37.81.222:8585

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • system.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

system.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE