🚨#Malware Alert
File type: #Apk #Android
Threat name: #IRATA #spyware
(IRATA - Iranian Remote Access Tool Android)
- Payload URLs:
hXXps://site2.ebl-ir.org/adl.apk
hXXps://site3.ebl-ir.org/adl.apk
hXXps://site4.ebl-ir.org/adl.apk
hXXps://site5.ebl-ir.org/adl.apk
hXXps://site6.ebl-ir.org/adl.apk
hXXps://site7.ebl-ir.org/adl.apk
hXXps://site8.ebl-ir.org/adl.apk
hXXps://site9.ebl-ir.org/adl.apk
hXXps://site10.ebl-ir.org/adl.apk
hXXps://site11.ebl-ir.org/adl.apk
hXXps://site12.ebl-ir.org/adl.apk
hXXps://site13.ebl-ir.org/adl.apk
hXXps://site14.ebl-ir.org/adl.apk
hXXps://site15.ebl-ir.org/adl.apk
hXXps://site16.ebl-ir.org/adl.apk
hXXps://site17.ebl-ir.org/adl.apk
hXXps://site18.ebl-ir.org/adl.apk
hXXps://site19.ebl-ir.org/adl.apk
hXXps://site20.ebl-ir.org/adl.apk
IP : 20.74.163.6
ISP: AS 8075 ( MICROSOFT-CORP-MSN-AS-BLOCK ) UAE
#MICROSOFT #Azure
- Payload:
https://bazaar.abuse.ch/sample/decab5c7e9a8d42e09aa6df39385c95dc603285374a76d8c8e08a025bb7e1dd9/
#smsspy #spyware #Phishing