General
-
Target
بازی-سکسی.apk
-
Size
6.8MB
-
Sample
241209-bwwwvaslbq
-
MD5
345638ed395c65e7d9e85269bcdc6593
-
SHA1
9edc329cfa4e5e539cfff1bee41d37938ce20da4
-
SHA256
dda5cd8d5c1cf43f0197552c140d7bc396a0be913a3556590d2fe45ffdd3c096
-
SHA512
3c02cffd9b70d18da2d60f03a224b87b30004c5d4783b5b47a84e29213987a1c9589f318108e594d76c9be1d41278c5bf47815e169765c928255e2dc3900c0cd
-
SSDEEP
196608:F/IxDRwIs+K0U1qmHv7hFOTpLKzc2crncT+8:FAxdw4HmqmHNFc5KeW
Behavioral task
behavioral1
Sample
بازی-سکسی.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
بازی-سکسی.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
origin.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral4
Sample
origin.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral5
Sample
origin.apk
Resource
android-x64-arm64-20240624-en
Malware Config
Targets
-
-
Target
بازی-سکسی.apk
-
Size
6.8MB
-
MD5
345638ed395c65e7d9e85269bcdc6593
-
SHA1
9edc329cfa4e5e539cfff1bee41d37938ce20da4
-
SHA256
dda5cd8d5c1cf43f0197552c140d7bc396a0be913a3556590d2fe45ffdd3c096
-
SHA512
3c02cffd9b70d18da2d60f03a224b87b30004c5d4783b5b47a84e29213987a1c9589f318108e594d76c9be1d41278c5bf47815e169765c928255e2dc3900c0cd
-
SSDEEP
196608:F/IxDRwIs+K0U1qmHv7hFOTpLKzc2crncT+8:FAxdw4HmqmHNFc5KeW
-
Irata
Irata is an Iranian remote access trojan Android malware first seen in August 2022.
-
Irata family
-
Irata payload
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Requests dangerous framework permissions
-
-
-
Target
origin.apk
-
Size
3.5MB
-
MD5
60a50546ee79e6756c8571dbce141010
-
SHA1
59ae8063374f16100e93b49dbb3e29187d0703ab
-
SHA256
6a34ecd487969eb57e9558916da2af5761d6e010ef9c941aed22e4b4679e0b2c
-
SHA512
2de954c16d2d57aea1cbfdba73ff1d68414a3b03423d657abe8da42a52069d6acd09cb2bf2681394aa1fd8b0f0fe5b9bf015e06671bf49eff82322d820255f06
-
SSDEEP
49152:f7vrJFUtDJDTYxkXGGF8pfbkTQuLD3SEg7Eu78y/5dwzmsk9mt8f1lMpCP6H63A:71yt9DEOdCfbk1baR8A5C6s1t4fWRCA
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Queries information about active data network
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-