Analysis
-
max time kernel
665s -
max time network
130s -
platform
android_x64 -
resource
android-x64-20220823-en -
resource tags
androidarch:x64arch:x86image:android-x64-20220823-enlocale:en-usos:android-10-x64system -
submitted
22-10-2022 14:10
Static task
static1
Behavioral task
behavioral1
Sample
f154a21efa4000659fe3870ba83dca45f622ec03a2f41e451aa7f868cc99faf8.apk
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral2
Sample
f154a21efa4000659fe3870ba83dca45f622ec03a2f41e451aa7f868cc99faf8.apk
Resource
android-x64-20220823-en
Behavioral task
behavioral3
Sample
f154a21efa4000659fe3870ba83dca45f622ec03a2f41e451aa7f868cc99faf8.apk
Resource
android-x64-arm64-20220823-en
General
-
Target
f154a21efa4000659fe3870ba83dca45f622ec03a2f41e451aa7f868cc99faf8.apk
-
Size
3.1MB
-
MD5
496067d850e97c971c0a9c1cc4b54674
-
SHA1
214c88d131e83982635bb91d7d0251a9447130f8
-
SHA256
f154a21efa4000659fe3870ba83dca45f622ec03a2f41e451aa7f868cc99faf8
-
SHA512
26dd65d7b423cc01120400e0048a3b02c6a2b5b0650e3fd8e98367f8a9b443fde81f82f6c5e5cd7387497dd7521630704380863032ba31ac5bd4f248116be152
-
SSDEEP
98304:gr49VJxq1VyIlDyCL3b9JKDxyD7sCSDWzeX5LtIq:u49V+bTj0sD7sCGX5LtIq
Malware Config
Signatures
-
Brata
Brata is a banking trojan malware first seen in 2019.
-
Brata payload 6 IoCs
Processes:
resource yara_rule /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata2 /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata3 /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata2 /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata3 /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata2 /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex family_brata3 -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.mtsfreegames.unicorn.runner.magical.little.ponyrunioc pid process /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex 4767 com.mtsfreegames.unicorn.runner.magical.little.ponyrun /data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dex 4767 com.mtsfreegames.unicorn.runner.magical.little.ponyrun
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dexFilesize
3.8MB
MD55e459004f0c2f90e913a132888c3688b
SHA127443fa1b1c74c8d0651c0d8f25b50d903cf7613
SHA256abcae2d1b121e3d469f0708733ddd85af2713115a2b0cbc540a3f701a4413784
SHA51253cc7a0a4068d7b5617887394b4da54409f85487553bc0e44a9aef6e4bd1176481d47371fcf9b04aeae7a5fe52c1fcd79baba7de2975dc28100f82cc006afd4d
-
/data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dexFilesize
3.8MB
MD55e459004f0c2f90e913a132888c3688b
SHA127443fa1b1c74c8d0651c0d8f25b50d903cf7613
SHA256abcae2d1b121e3d469f0708733ddd85af2713115a2b0cbc540a3f701a4413784
SHA51253cc7a0a4068d7b5617887394b4da54409f85487553bc0e44a9aef6e4bd1176481d47371fcf9b04aeae7a5fe52c1fcd79baba7de2975dc28100f82cc006afd4d
-
/data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/app_ded/3nXQuuSxYgQESbNZVyqFaKbM6ooKGPXg.dexFilesize
3.8MB
MD55e459004f0c2f90e913a132888c3688b
SHA127443fa1b1c74c8d0651c0d8f25b50d903cf7613
SHA256abcae2d1b121e3d469f0708733ddd85af2713115a2b0cbc540a3f701a4413784
SHA51253cc7a0a4068d7b5617887394b4da54409f85487553bc0e44a9aef6e4bd1176481d47371fcf9b04aeae7a5fe52c1fcd79baba7de2975dc28100f82cc006afd4d
-
/data/user/0/com.mtsfreegames.unicorn.runner.magical.little.ponyrun/files/a11yFilesize
8B
MD52e5d8aa3dfa8ef34ca5131d20f9dad51
SHA13cc1d5a427a45820b04fe30f78a972b784952460
SHA256cde0fb0dec1400c54a0f7e7eafa73624c53e4da258bbd34b3380a0defeba95c1
SHA512a0527c1de9df8c529337f73be73cf98fcde155fcf00c7522f67a4a6298b52853d9767815d8811c2a7e5e829871a5dea9174b2b7e90fb7c98a62467240dd78434