MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 090e0a999e5fa62739f9bc5d1474c1bd964f2f15a20824eda7d67ae080f5bef9. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IRATA


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 090e0a999e5fa62739f9bc5d1474c1bd964f2f15a20824eda7d67ae080f5bef9
SHA3-384 hash: 04487b74c2e131d42d88575f58fd46801bfe9b5cd2d6abc001c0b356dcfa4818a972e7e9aa475f7279efe3c0208bbff5
SHA1 hash: ba5b271a35fb7588313a18d4093638f4ae00b288
MD5 hash: db72d4823679136473bc9eacc17b997d
humanhash: steak-eleven-magnesium-tango
File name:M.apk
Download: download sample
Signature IRATA
File size:3'482'533 bytes
First seen:2022-08-25 22:56:36 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 98304:aEVF6aL7fDW3v0AMYfccAyIif51VgHR14BQDLhWnd:a46x3vKcAyXTVcQB+LhWd
TLSH T1E8F52303F315A517C9F6C37264B0623960765E19DB07FB872C5833BE68B7AE80B84AD5
TrID 57.0% (.APK) Android Package (38500/1/9)
20.0% (.JAR) Java Archive (13500/1/2)
15.5% (.SH3D) Sweet Home 3D design (generic) (10500/1/3)
5.9% (.ZIP) ZIP compressed archive (4000/1)
1.4% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter onecert_ir
Tags:android apk iran IRATA signed

Code Signing Certificate

Organisation:Android
Issuer:Android
Algorithm:sha1WithRSAEncryption
Valid from:2008-02-29T01:33:46Z
Valid to:2035-07-17T01:33:46Z
Serial number: 936eacbe07f201df
Intelligence: 1707 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
onecert_ir
IRATA - Iranian Remote Access Tool Android

Intelligence


File Origin
# of uploads :
1
# of downloads :
367
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
android smsspy spyagent spynote
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
60 / 100
Signature
Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Removes its application launcher (likely to stay hidden)
Behaviour
Behavior Graph:
n/a
Threat name:
Android.Trojan.SpyNote
Status:
Malicious
First seen:
2022-08-25 22:57:21 UTC
File Type:
Binary (Archive)
Extracted files:
276
AV detection:
14 of 26 (53.85%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:brata android evasion
Behaviour
Removes a system notification.
Reads information about phone network operator.
Acquires the wake lock.
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

IRATA

apk 090e0a999e5fa62739f9bc5d1474c1bd964f2f15a20824eda7d67ae080f5bef9

(this sample)

  
Dropping
IRATA
  
Delivery method
Distributed via web download

Comments