MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 02c08ec2675abe6e09691419dd1a281194879c6e393de1cdfb150b864378d921. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



XLoader


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 02c08ec2675abe6e09691419dd1a281194879c6e393de1cdfb150b864378d921
SHA3-384 hash: 56709833c2b3b9410944ddb944d0d85eaad977c99b45b37b4f6cebcab651ce12624b12c0fddda6ffd76e6ad2d72fa2db
SHA1 hash: 2692561db1cc2604f068d90b108ec5604d76b969
MD5 hash: 6f6ae14e50bf1a55cf414cb95e4570c4
humanhash: india-moon-sixteen-nuts
File name:japanpost.apk
Download: download sample
Signature XLoader
File size:261'769 bytes
First seen:2022-08-21 01:43:24 UTC
Last seen:Never
File type: apk
MIME type:application/java-archive
ssdeep 6144:qNpXsoSXfhjdhnVni/YtY3Swc7jMmQlMZcR8PO3pyYyUujvhR:qNxsoSXpM/MwojYMZca2IYyLR
TLSH T1934423113A02CB7DE232FB38C577B854133BDA79A0D9AC3A2CC590695809BFA45E578D
TrID 67.5% (.APK) Android Package (38500/1/9)
23.6% (.JAR) Java Archive (13500/1/2)
7.0% (.ZIP) ZIP compressed archive (4000/1)
1.7% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter ozuma5119
Tags:android apk signed xloader

Code Signing Certificate

Organisation:Android
Issuer:Android
Algorithm:sha1WithRSAEncryption
Valid from:2008-02-29T01:33:46Z
Valid to:2035-07-17T01:33:46Z
Serial number: 936eacbe07f201df
Intelligence: 1719 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
532
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
android wroba
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
48 / 100
Signature
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
n/a
Threat name:
Android.Dropper.Wroba
Status:
Malicious
First seen:
2022-08-21 01:44:08 UTC
File Type:
Binary (Archive)
Extracted files:
11
AV detection:
16 of 26 (61.54%)
Threat level:
  3/5
Result
Malware family:
xloader_apk
Score:
  10/10
Tags:
family:xloader_apk android banker evasion infostealer ransomware trojan
Behaviour
Uses Crypto APIs (Might try to encrypt user data).
Reads information about phone network operator.
Requests disabling of battery optimizations (often used to enable hiding in the background).
Acquires the wake lock.
Loads dropped Dex/Jar
XLoader payload
XLoader, MoqHao
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

XLoader

apk 02c08ec2675abe6e09691419dd1a281194879c6e393de1cdfb150b864378d921

(this sample)

  
Delivery method
Distributed via web download

Comments