General

  • Target

    evil.apk

  • Size

    2.2MB

  • MD5

    fb53e9379186f32862388c3d93130959

  • SHA1

    5807d9469c5eb14125439680d684347d49c5d2e7

  • SHA256

    8ba737ea98efd66ca64a9ddb61c2ca30e5f9f851d47c1dab7da7f4f01f95e9f9

  • SHA512

    864efef5774e513fcb673f2b05c3928d20360d552b3b85b14aaa7bdfd91f0338e53b97b998886184c48e9d1d6287168aaa1ee277f0ac49698c3f59462d303023

  • SSDEEP

    49152:MgvYNQHt6QU1f+1Lv1MlQs8M7ysihlJOGGtgCX3dG2cfzX:eNhQcc5uQt600HDcf7

Score
10/10

Malware Config

Extracted

Family

androrat

C2

100.115.92.195:8000

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • evil.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

evil.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE