MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 397e6285bf8403aa1d0e101b47297431681ecd91c8d278fac2d6609be2ffa0c6. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 2 File information Comments

SHA256 hash: 397e6285bf8403aa1d0e101b47297431681ecd91c8d278fac2d6609be2ffa0c6
SHA3-384 hash: 3889d195828aea33f23963acd0afadbc31835db79a3dc89e5e90c8116ec017082b079a0742f148c0f5e81b7d452d032b
SHA1 hash: a58cd3d3466ad7c174dec55eeb9d59d91dc7165a
MD5 hash: 7dc49ff347202af495605b7cf4d42f8e
humanhash: delta-diet-potato-mountain
File name:app (1).apk
Download: download sample
File size:5'747'277 bytes
First seen:2025-02-11 08:50:32 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 98304:t5DYC/BHx18EXP5l7ZyplD6UzgjKxNCKH1Fw/gV7Jpz7MI2NmXWBsLEn:TDR/x3f5l7ZyLDNpw/gp4IfXWB3n
TLSH T1AA460289FB886A2FCC7710320AAA567256474D578E8397877848330C79776E90F9DBCC
TrID 49.0% (.APK) Android Package (27000/1/5)
24.5% (.JAR) Java Archive (13500/1/2)
19.0% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
7.2% (.ZIP) ZIP compressed archive (4000/1)
Magika apk
Reporter mohit
Tags:android apk FakeApp signed Warnerbros

Code Signing Certificate

Organisation:ajin
Issuer:ajin
Algorithm:sha512WithRSAEncryption
Valid from:2023-12-25T06:44:30Z
Valid to:2122-12-25T06:44:30Z
Serial number: 018c9fb7cb4b
Thumbprint Algorithm:SHA256
Thumbprint: 5fcfb0abb5947562384ea40fab8a7911ba8ad52dde538c5d5aa12d649ad1b7c5
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform


Avatar
mohit
IOC
https://wbmovie66.com/download/

Intelligence


File Origin
# of uploads :
1
# of downloads :
239
Origin country :
IN IN
Vendor Threat Intelligence
Verdict:
Unknown
Threat level:
  2.5/10
Confidence:
100%
Tags:
crypto evasive expand fingerprint lolbin remote signed
Result
Application Permissions
read external storage contents (READ_EXTERNAL_STORAGE)
full Internet access (INTERNET)
view network status (ACCESS_NETWORK_STATE)
view Wi-Fi status (ACCESS_WIFI_STATE)
prevent phone from sleeping (WAKE_LOCK)
Result
Malware family:
n/a
Score:
  7/10
Tags:
android collection credential_access discovery impact persistence
Behaviour
Checks CPU information
Checks memory information
Registers a broadcast receiver at runtime (usually for listening for system events)
Queries the mobile country code (MCC)
Obtains sensitive information copied to the device clipboard
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:Suspicious_Latam_MSI_and_ZIP_Files
Author:eremit4, P4nd3m1cb0y
Description:Detects suspicious .msi and .zip files used in Latam banking trojan campaigns.
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

apk 397e6285bf8403aa1d0e101b47297431681ecd91c8d278fac2d6609be2ffa0c6

(this sample)

  
Delivery method
Distributed via web download

Comments