{
	"id": "edb0218e-9388-4d58-988c-4eebfe5bc155",
	"created_at": "2026-04-06T00:18:16.778663Z",
	"updated_at": "2026-04-10T13:12:40.950857Z",
	"deleted_at": null,
	"sha1_hash": "7d6f67461cf66844bf6d7c4b7acf77eb5a5f284d",
	"title": "Rana (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 32581,
	"plain_text": "Rana (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 19:50:20 UTC\r\nRana\r\nActor(s): APT39\r\nThere is no description at this point.\r\nReferences\r\n2020-12-07 ⋅ Reversing Labs ⋅\r\nRana Android Malware Your past catches up, sooner or later...\r\nRana\r\nYara Rules\r\n[TLP:WHITE] apk_rana_w0 (20201208 | Detects Rana Android Malware Resource strings)\r\nDownload all Yara Rules\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/apk.rana\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/apk.rana\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/apk.rana"
	],
	"report_names": [
		"apk.rana"
	],
	"threat_actors": [
		{
			"id": "62947fad-14d2-40bf-a721-b1fc2fbe5b5d",
			"created_at": "2025-08-07T02:03:24.741594Z",
			"updated_at": "2026-04-10T02:00:03.653394Z",
			"deleted_at": null,
			"main_name": "COBALT HICKMAN",
			"aliases": [
				"APT39 ",
				"Burgundy Sandstorm ",
				"Chafer ",
				"ITG07 ",
				"Remix Kitten "
			],
			"source_name": "Secureworks:COBALT HICKMAN",
			"tools": [
				"MechaFlounder",
				"Mimikatz",
				"Remexi",
				"TREKX"
			],
			"source_id": "Secureworks",
			"reports": null
		},
		{
			"id": "1b3a247f-6186-4482-8b92-c3fb2d767c7d",
			"created_at": "2023-01-06T13:46:38.883911Z",
			"updated_at": "2026-04-10T02:00:03.132231Z",
			"deleted_at": null,
			"main_name": "APT39",
			"aliases": [
				"COBALT HICKMAN",
				"G0087",
				"Radio Serpens",
				"TA454",
				"ITG07",
				"Burgundy Sandstorm",
				"REMIX KITTEN"
			],
			"source_name": "MISPGALAXY:APT39",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "6b6155e4-94ec-4909-b908-550afe758ad6",
			"created_at": "2022-10-25T15:50:23.365074Z",
			"updated_at": "2026-04-10T02:00:05.2978Z",
			"deleted_at": null,
			"main_name": "APT39",
			"aliases": [
				"APT39",
				"ITG07",
				"Remix Kitten"
			],
			"source_name": "MITRE:APT39",
			"tools": [
				"NBTscan",
				"MechaFlounder",
				"Remexi",
				"CrackMapExec",
				"pwdump",
				"Mimikatz",
				"Windows Credential Editor",
				"Cadelspy",
				"PsExec",
				"ASPXSpy",
				"ftp"
			],
			"source_id": "MITRE",
			"reports": null
		}
	],
	"ts_created_at": 1775434696,
	"ts_updated_at": 1775826760,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7d6f67461cf66844bf6d7c4b7acf77eb5a5f284d.pdf",
		"text": "https://archive.orkl.eu/7d6f67461cf66844bf6d7c4b7acf77eb5a5f284d.txt",
		"img": "https://archive.orkl.eu/7d6f67461cf66844bf6d7c4b7acf77eb5a5f284d.jpg"
	}
}