MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 abe6dc28293f0323533e4bb9692a8a55009808c5a5b14495367461c6060a35e2. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: abe6dc28293f0323533e4bb9692a8a55009808c5a5b14495367461c6060a35e2
SHA3-384 hash: ed301f95b814870145694f28ea094a4a393af98059c358fe10a28073787d788899544fc99ed572dca846e72a444c5ee5
SHA1 hash: 42e58e3f805f38b91401cb7d4816692f8e4c5c91
MD5 hash: 322b03659e56a71fa51837ba354dd9d4
humanhash: mobile-alaska-mockingbird-emma
File name:finance_locker_qrcode.apk
Download: download sample
File size:8'686'101 bytes
First seen:2025-11-26 16:10:04 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 196608:ToAP2Nh+I/eGikW4cFKXjFX+OtzdSycg04HdGikejY:ToAm++hn/XXjFuizd/ciVVY
TLSH T1F7961286F768962FC8B750338DEA523122565D17C6426B4B39A8376C3C73AF80F45BC9
TrID 32.7% (.SPE) SPSS Extension (30000/1/7)
29.5% (.APK) Android Package (27000/1/5)
14.7% (.JAR) Java Archive (13500/1/2)
11.4% (.SH3D) Sweet Home 3D Design (generic) (10500/1/3)
7.1% (.GL) GRASP animation (6508/7/3)
Magika apk
Reporter juroots
Tags:apk signed

Code Signing Certificate

Organisation:mobi cop
Issuer:mobi cop
Algorithm:sha256WithRSAEncryption
Valid from:2021-01-28T10:23:50Z
Valid to:2071-01-16T10:23:50Z
Serial number: 3eed9647
Thumbprint Algorithm:SHA256
Thumbprint: 71fbeea3930517f083063c685749c52d1a184b1cd5d6b05b8f8f82e0c2de2d08
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
48
Origin country :
IL IL
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
base64 crypto evasive fingerprint persistence signed
Verdict:
Adware
File Type:
apk
First seen:
2024-12-04T02:33:00Z UTC
Last seen:
2025-11-27T07:01:00Z UTC
Hits:
~10
Result
Malware family:
n/a
Score:
  7/10
Tags:
android discovery execution persistence
Behaviour
Schedules tasks to execute at a specified time
Acquires the wake lock
Queries information about active data network
Reads information about phone network operator.
Queries information about running processes on the device
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

apk abe6dc28293f0323533e4bb9692a8a55009808c5a5b14495367461c6060a35e2

(this sample)

  
Delivery method
Distributed via web download

Comments