MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e04ef421c1337398d527a3708ea0f87353486aafe9d4560d22ffc9b59562e28e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Intelligence 7 IOCs YARA 2 File information Comments

SHA256 hash: e04ef421c1337398d527a3708ea0f87353486aafe9d4560d22ffc9b59562e28e
SHA3-384 hash: f25f2c53db7b81c668a9adc8f792ad410b3cf58d959708fceae4e86966a85a8c48e7ece0678d615562aaf97bd1da166a
SHA1 hash: bd2b5ece4ab8011e888fc21ef343c844288449a5
MD5 hash: 950f47f5da4d9e8ef202c8ffb5950c22
humanhash: illinois-mars-red-edward
File name:20180724185728_PetK_UC_1.4.0.apk
Download: download sample
File size:57'622'331 bytes
First seen:2026-02-22 14:02:37 UTC
Last seen:Never
File type: apk
MIME type:application/java-archive
ssdeep 1572864:+jEzikGSi58H03d7v1efc9xVCgQiaYRqSjc5:+jIiENc9xVt7aYIQc5
TLSH T102C733863E49CC19F0260B39AB778195F5644FCD5502F4EFA458BB903EBBE805B01EB9
TrID 60.6% (.APK) Android Package (27000/1/5)
30.3% (.JAR) Java Archive (13500/1/2)
8.9% (.ZIP) ZIP compressed archive (4000/1)
Magika apk
Reporter juroots
Tags:apk

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
US US
Vendor Threat Intelligence
No detections
Result
Application Permissions
display system-level alerts (SYSTEM_ALERT_WINDOW)
act as an account authenticator (AUTHENTICATE_ACCOUNTS)
list accounts (GET_ACCOUNTS)
use the authentication credentials of an account (USE_CREDENTIALS)
coarse (network-based) location (ACCESS_COARSE_LOCATION)
mount and unmount file systems (MOUNT_UNMOUNT_FILESYSTEMS)
fine (GPS) location (ACCESS_FINE_LOCATION)
read contact data (READ_CONTACTS)
modify global system settings (WRITE_SETTINGS)
read/modify/delete external storage contents (WRITE_EXTERNAL_STORAGE)
read external storage contents (READ_EXTERNAL_STORAGE)
read phone state and identity (READ_PHONE_STATE)
send SMS messages (SEND_SMS)
retrieve running applications (GET_TASKS)
control vibrator (VIBRATE)
change network connectivity (CHANGE_NETWORK_STATE)
measure application storage space (GET_PACKAGE_SIZE)
create Bluetooth connections (BLUETOOTH)
bluetooth administration (BLUETOOTH_ADMIN)
allow use of fingerprint (USE_FINGERPRINT)
access extra location provider commands (ACCESS_LOCATION_EXTRA_COMMANDS)
change Wi-Fi status (CHANGE_WIFI_STATE)
full Internet access (INTERNET)
view network status (ACCESS_NETWORK_STATE)
view Wi-Fi status (ACCESS_WIFI_STATE)
Verdict:
Adware
File Type:
apk
First seen:
2020-03-18T06:07:00Z UTC
Last seen:
2020-06-15T02:42:00Z UTC
Hits:
~10
Gathering data
Threat name:
Android.Adware.Ewind
Status:
Malicious
First seen:
2020-03-15 21:35:00 UTC
AV detection:
9 of 41 (21.95%)
Threat level:
  1/5
Result
Malware family:
n/a
Score:
  6/10
Tags:
android upx
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CP_Script_Inject_Detector
Author:DiegoAnalytics
Description:Detects attempts to inject code into another process across PE, ELF, Mach-O binaries
Rule name:telebot_framework
Author:vietdx.mb

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

apk e04ef421c1337398d527a3708ea0f87353486aafe9d4560d22ffc9b59562e28e

(this sample)

  
Delivery method
Distributed via web download

Comments