MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2f2ef1d5e36b81deb3e296da1ca0544e89e17c5f2bf3cfc3c8253d58d295bb51. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
LazarusStealer
Vendor detections: 7
| SHA256 hash: | 2f2ef1d5e36b81deb3e296da1ca0544e89e17c5f2bf3cfc3c8253d58d295bb51 |
|---|---|
| SHA3-384 hash: | 22d7394f3b9453b166aa17d66c63ae71b5c281b47923a1c7f4ceee626c15cd4dee2123a02755b78d2a5374613074060f |
| SHA1 hash: | d95214bfaca08ac41fe67bc3f17efbcce3cbf2a0 |
| MD5 hash: | c12b3a8538e68b1d4812bda3859e67c0 |
| humanhash: | west-robin-november-charlie |
| File name: | Видео.apk |
| Download: | download sample |
| Signature | LazarusStealer |
| File size: | 5'428'767 bytes |
| First seen: | 2025-11-21 09:06:00 UTC |
| Last seen: | Never |
| File type: | apk |
| MIME type: | application/zip |
| ssdeep | 98304:zg6UDPHOIreOTUxF06AjNzwNEoS3+sn25eAQYLwF2+KaylQ8CqddboTwrWOsbb:zgHDPuIrevA6szwNETuk25elYMEFQIdK |
| TLSH | T14246D0D6E7C8999EC4FB5772C83A62E111474D26CB439E839D28723C38B71E01E59BD8 |
| TrID | 46.2% (.VYM) VYM Mind Map (12500/1/3) 38.8% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3) 14.8% (.ZIP) ZIP compressed archive (4000/1) |
| Magika | apk |
| Reporter | |
| Tags: | apk LazarusStealer |
Intelligence
File Origin
# of uploads :
1
# of downloads :
155
Origin country :
ILVendor Threat Intelligence
No detections
Verdict:
Suspicious
Threat level:
5/10
Confidence:
100%
Tags:
expand lolbin signed
Result
Application Permissions
receive SMS (RECEIVE_SMS)
read SMS or MMS (READ_SMS)
send SMS messages (SEND_SMS)
read phone state and identity (READ_PHONE_STATE)
read contact data (READ_CONTACTS)
modify global system settings (WRITE_SETTINGS)
full Internet access (INTERNET)
automatically start at boot (RECEIVE_BOOT_COMPLETED)
view network status (ACCESS_NETWORK_STATE)
prevent phone from sleeping (WAKE_LOCK)
show app notification (READ_APP_BADGE)
modify phone status (MODIFY_PHONE_STATE)
Result
Verdict:
UNKNOWN
Link:
Verdict:
Malicious
File Type:
apk
First seen:
2025-11-20T22:36:00Z UTC
Last seen:
2025-11-22T13:59:00Z UTC
Hits:
~10
Score:
100%
Verdict:
Malware
File Type:
APK
Detection(s):
Suspicious file
Result
Malware family:
lazarus_stealer
Score:
10/10
Tags:
family:lazarus_stealer android banker collection evasion impact infostealer trojan
Behaviour
Uses Crypto APIs (Might try to encrypt user data)
Requests changing the default SMS application.
Loads dropped Dex/Jar
LazarusStealer
Lazarus_stealer family
Malware Config
C2 Extraction:
http://23.94.126.153:1133/check_version
http://23.94.126.153:1133/send_file
http://23.94.126.153:1133/send_file
Verdict:
Unknown
Tags:
n/a
YARA:
n/a
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Web download
Delivery method
Distributed via web download
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.