Analysis
-
max time kernel
388205s -
max time network
84s -
platform
android_x64 -
resource
android-x64-20230621-en -
resource tags
androidarch:x64arch:x86image:android-x64-20230621-enlocale:en-usos:android-10-x64system -
submitted
21-08-2023 08:07
Static task
static1
Behavioral task
behavioral1
Sample
27e0ec79dbb7c7f99b43c8c01a94188d1071d1245b1745d0e066ae774c78a8f8_brata.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
27e0ec79dbb7c7f99b43c8c01a94188d1071d1245b1745d0e066ae774c78a8f8_brata.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
27e0ec79dbb7c7f99b43c8c01a94188d1071d1245b1745d0e066ae774c78a8f8_brata.apk
Resource
android-x64-arm64-20230621-en
General
-
Target
27e0ec79dbb7c7f99b43c8c01a94188d1071d1245b1745d0e066ae774c78a8f8_brata.apk
-
Size
3.1MB
-
MD5
aa294efd44594b64eb93904dbb3c7a2c
-
SHA1
91639afbface1289c1f35ed1e822843ad75514a7
-
SHA256
27e0ec79dbb7c7f99b43c8c01a94188d1071d1245b1745d0e066ae774c78a8f8
-
SHA512
659ed5447cc8b6b79c162464e941547b63702f9387ec4b2ae01a4bea1c522ee2a66327fae35c98ea962b46feaba9ba7c8af74acb68b0f4ba90900e936f0ee43c
-
SSDEEP
98304:1eVM3OTHHj0B8GJPl1LUV9dcKUQA1QgfJRbdpA52:sVM3OvGdLMdXUb1QMRhp02
Malware Config
Signatures
-
Brata
Brata is a banking trojan malware first seen in 2019.
-
Brata payload 6 IoCs
resource yara_rule behavioral2/files/4782-0.dat family_brata2 behavioral2/files/4782-0.dat family_brata3 behavioral2/memory/4782-0.dex family_brata2 behavioral2/memory/4782-0.dex family_brata3 behavioral2/memory/4782-1.dex family_brata2 behavioral2/memory/4782-1.dex family_brata3 -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xd.craft.school/app_ded/qhpc4lnifUFdkAQt1d1ibGOQV48aS7v6.dex 4782 com.xd.craft.school /data/user/0/com.xd.craft.school/app_ded/qhpc4lnifUFdkAQt1d1ibGOQV48aS7v6.dex 4782 com.xd.craft.school
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5295ed823d46c31cef4135633633daf3b
SHA1bb3569427f6e34114bce6eff08b5b283f5195393
SHA256906d5dbff4fd804294ca836d71ee7a8c1d145e2b482592458aa8413a076efe79
SHA512effb517c5c1cf11329fd0d3cde9e7999245bc51b7e7d56451eb34472e719c3cde64532a2d2cc0c234af2fb9ccf80e446c2d81c9d1f841199ec68c27450d5074e
-
Filesize
3.8MB
MD5295ed823d46c31cef4135633633daf3b
SHA1bb3569427f6e34114bce6eff08b5b283f5195393
SHA256906d5dbff4fd804294ca836d71ee7a8c1d145e2b482592458aa8413a076efe79
SHA512effb517c5c1cf11329fd0d3cde9e7999245bc51b7e7d56451eb34472e719c3cde64532a2d2cc0c234af2fb9ccf80e446c2d81c9d1f841199ec68c27450d5074e
-
Filesize
3.8MB
MD5295ed823d46c31cef4135633633daf3b
SHA1bb3569427f6e34114bce6eff08b5b283f5195393
SHA256906d5dbff4fd804294ca836d71ee7a8c1d145e2b482592458aa8413a076efe79
SHA512effb517c5c1cf11329fd0d3cde9e7999245bc51b7e7d56451eb34472e719c3cde64532a2d2cc0c234af2fb9ccf80e446c2d81c9d1f841199ec68c27450d5074e
-
Filesize
8B
MD52e5d8aa3dfa8ef34ca5131d20f9dad51
SHA13cc1d5a427a45820b04fe30f78a972b784952460
SHA256cde0fb0dec1400c54a0f7e7eafa73624c53e4da258bbd34b3380a0defeba95c1
SHA512a0527c1de9df8c529337f73be73cf98fcde155fcf00c7522f67a4a6298b52853d9767815d8811c2a7e5e829871a5dea9174b2b7e90fb7c98a62467240dd78434