General

  • Target

    injector.apk

  • Size

    2.2MB

  • MD5

    5c1ee6114834ce43b857fb4348d635e3

  • SHA1

    824dca40ffc4892f4ab0cc5759418ad531a78de0

  • SHA256

    95dd6dbc3bf0984b24fd4a4f83c609ce4a9fc0a75a456f1cf3197d08527b698d

  • SHA512

    75d42755b28ba1ecc590c88244139ea8a65b73a7ee09052a24e61c53fe822f97c4e4504446c2b604f246b376d545003b8ef952a7333ceb348d5a1f2dc86db56a

  • SSDEEP

    49152:xLIAaISxkhDbyzXNi0XisZcfwyi22EVkCrRd/gvY6Z2:traISChuNigihfwyi22ANdD6s

Score
10/10

Malware Config

Extracted

Family

androrat

C2

192.168.118.130:8080

Signatures

  • Androrat family
  • Requests dangerous framework permissions 10 IoCs

Files

  • injector.apk
    .apk android

    com.example.reverseshell2

    com.example.reverseshell2.MainActivity


Android Permissions

injector.apk

Permissions

android.permission.ACCESS_NETWORK_STATE

android.permission.INTERNET

android.permission.ACCESS_WIFI_STATE

android.permission.RECEIVE_BOOT_COMPLETED

android.permission.WAKE_LOCK

android.permission.CAMERA

android.permission.READ_EXTERNAL_STORAGE

android.permission.WRITE_EXTERNAL_STORAGE

android.permission.VIBRATE

android.permission.READ_SMS

android.permission.ACCESS_FINE_LOCATION

android.permission.ACCESS_COARSE_LOCATION

android.permission.READ_CALL_LOG

android.permission.RECORD_AUDIO

android.permission.SYSTEM_ALERT_WINDOW

android.permission.READ_PHONE_STATE