General

  • Target

    rat.apk

  • Size

    2.2MB

  • MD5

    09a3156200f624d7e99841429b297e34

  • SHA1

    6a8046070df3d3cd82486dca7460ea04c47e1f8c

  • SHA256

    5abe451539bdb230d34edca5bc2ea333572d83220be7163eb46e4f4c2f444344

  • SHA512

    d7c5532921dc3b6e503a687b6ae9e611198bb6211e14642033f462b07ed9d7ccc5f7d1df3c47dfb61f28302139f4048be722d51ee40ab2c0f7ab93affc78b9b3

  • SSDEEP

    49152:MX01o6fxgvYZsRT4SVYr8cKrIszayzaLcTnQCITCiU77:ME19ZoT4wYocKVz0MnQhU7

Score
10/10

Malware Config

Extracted

Family

androrat

C2

172.17.0.1:8000

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • rat.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

rat.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE