{
	"id": "e4384b7c-6f78-4a52-8c9e-6b1a04fdc251",
	"created_at": "2026-04-06T00:11:57.354308Z",
	"updated_at": "2026-04-10T03:33:57.022352Z",
	"deleted_at": null,
	"sha1_hash": "e35eb0be262817f644e5efa2298c97e04ffe5d77",
	"title": "Dracarys (Malware Family)",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 33077,
	"plain_text": "Dracarys (Malware Family)\r\nBy Fraunhofer FKIE\r\nArchived: 2026-04-05 12:38:02 UTC\r\napk.dracarys (Back to overview)\r\nDracarys\r\nActor(s): HAZY TIGER\r\nAndroid malware that impersonates genuine applications such as Signal, Telegram, WhatsApp, YouTube, and\r\nother chat applications and distributes through phishing sites.\r\nReferences\r\n2022-08-09 ⋅ cyble ⋅ Cyble Research Labs\r\nBitter APT Group Using “Dracarys” Android Spyware\r\nDracarys\r\nThere is no Yara-Signature yet.\r\nSource: https://malpedia.caad.fkie.fraunhofer.de/details/apk.dracarys\r\nhttps://malpedia.caad.fkie.fraunhofer.de/details/apk.dracarys\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://malpedia.caad.fkie.fraunhofer.de/details/apk.dracarys"
	],
	"report_names": [
		"apk.dracarys"
	],
	"threat_actors": [
		{
			"id": "655f7d0b-7ea6-4950-b272-969ab7c27a4b",
			"created_at": "2022-10-27T08:27:13.133291Z",
			"updated_at": "2026-04-10T02:00:05.315213Z",
			"deleted_at": null,
			"main_name": "BITTER",
			"aliases": [
				"T-APT-17"
			],
			"source_name": "MITRE:BITTER",
			"tools": [
				"ZxxZ"
			],
			"source_id": "MITRE",
			"reports": null
		},
		{
			"id": "acd789fa-d488-47f3-b9cc-fdb18b1fa375",
			"created_at": "2023-01-06T13:46:39.332092Z",
			"updated_at": "2026-04-10T02:00:03.290017Z",
			"deleted_at": null,
			"main_name": "HAZY TIGER",
			"aliases": [
				"T-APT-17",
				"APT-C-08",
				"Orange Yali",
				"TA397"
			],
			"source_name": "MISPGALAXY:HAZY TIGER",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "bf6cb670-bb69-473f-a220-97ac713fd081",
			"created_at": "2022-10-25T16:07:23.395205Z",
			"updated_at": "2026-04-10T02:00:04.578924Z",
			"deleted_at": null,
			"main_name": "Bitter",
			"aliases": [
				"G1002",
				"T-APT-17",
				"TA397"
			],
			"source_name": "ETDA:Bitter",
			"tools": [
				"Artra Downloader",
				"ArtraDownloader",
				"Bitter RAT",
				"BitterRAT",
				"Dracarys"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434317,
	"ts_updated_at": 1775792037,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/e35eb0be262817f644e5efa2298c97e04ffe5d77.pdf",
		"text": "https://archive.orkl.eu/e35eb0be262817f644e5efa2298c97e04ffe5d77.txt",
		"img": "https://archive.orkl.eu/e35eb0be262817f644e5efa2298c97e04ffe5d77.jpg"
	}
}