MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0628ad6d1fd836b13b22e75fa169502d8ce78b7ad20f0261eb5151da98437bca. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CoinMiner


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: 0628ad6d1fd836b13b22e75fa169502d8ce78b7ad20f0261eb5151da98437bca
SHA3-384 hash: 48eb88b456eff70b37c4668695f2fbd7c1571d7f6b680afb725079e02837d5380c9cd0ee465c548cf36a10028c84923a
SHA1 hash: 5c9d9649b439b86cf18987865b32dab228ace037
MD5 hash: 54d37f09251cbe283f42f64964083ca8
humanhash: pennsylvania-berlin-ceiling-hawaii
File name:duanj.me.apk
Download: download sample
Signature CoinMiner
File size:26'053'444 bytes
First seen:2026-03-15 08:26:08 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 786432:Qi4HkZXQEAj5xfQLOmf+MjT4HecyY2M/XxM:+HktQEQORfjT4YY2M/u
TLSH T18B472347FB84882BF4F753B241399761D44B4C668B439AC77A14353C28B7AD02F9AADC
TrID 33.3% (.APK) Android Package (27000/1/5)
16.6% (.JAR) Java Archive (13500/1/2)
16.6% (.ZAN) BlueEyes Animation (13500/1/4)
15.4% (.VYM) VYM Mind Map (12500/1/3)
12.9% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
Magika apk
Reporter jitesh
Tags:android apk CoinMiner malware RiskWare SpyAgent trojan

Intelligence


File Origin
# of uploads :
1
# of downloads :
231
Origin country :
IN IN
Vendor Threat Intelligence
No detections
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
android bankbot btmob coinminer expand lolbin masquerade signed spyagent spymax
Gathering data
Threat name:
Linux.Coinminer.Generic
Status:
Malicious
First seen:
2026-03-15 08:27:52 UTC
File Type:
Binary (Archive)
Extracted files:
1009
AV detection:
16 of 24 (66.67%)
Threat level:
  4/5
Result
Malware family:
Score:
  10/10
Tags:
family:xmrig miner
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:dependsonpythonailib
Author:Tim Brown
Description:Hunts for dependencies on Python AI libraries
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

CoinMiner

apk 0628ad6d1fd836b13b22e75fa169502d8ce78b7ad20f0261eb5151da98437bca

(this sample)

  
Delivery method
Distributed via web download

Comments