MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e1b46d3d5cb232880efd189482c49882178db717994d3f3663dfe4eca843bfa0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: e1b46d3d5cb232880efd189482c49882178db717994d3f3663dfe4eca843bfa0
SHA3-384 hash: a1a9f49bb4afe9d70d77ad6d671b96d31af1672ec2ff9b85c36d1cc1642f3e5878a4acd29b92574ad40a8729f8bdb4c6
SHA1 hash: b3665e9ba822ea05683906bc3baf88c5d44e9c49
MD5 hash: 623a68c5c01d07896001c6b9f84bdfc0
humanhash: fruit-cat-uniform-equal
File name:Claro Security.apk
Download: download sample
File size:2'039'509 bytes
First seen:2021-07-21 08:21:08 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 49152:See3lHOdSXZa8Obvzd8zKGc71SiOLBVPLqAo5YgwQzc:SxlHASFOV8zDc71SrLBVPLRorI
TLSH T18595E086F7C9A46FEDF3C3364776469A96024C5A8B43D3574A94B13C0DB79C08E4AEC8
Reporter JAMESWT_WT
Tags:apk signed

Code Signing Certificate

Organisation:fdhrtjtykytkyulkuyluy
Issuer:fdhrtjtykytkyulkuyluy
Algorithm:sha256WithRSAEncryption
Valid from:2020-04-18T15:29:13Z
Valid to:3018-08-20T15:29:13Z
Serial number: 45e49883
Intelligence: 2 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: e277a1fd1e75f5a5380bd815445d28729145b076a6738e87e92d707291293393
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
110
Origin country :
n/a
Vendor Threat Intelligence
Result
Threat name:
Unknown
Detection:
malicious
Classification:
spyw.evad
Score:
68 / 100
Signature
Antivirus / Scanner detection for submitted sample
Monitors outgoing Phone calls
Multi AV Scanner detection for submitted file
Queries the device phone number (MSISDN)
Removes its application launcher (likely to stay hidden)
Behaviour
Behavior Graph:
n/a
Threat name:
Android.Trojan.Boogr
Status:
Malicious
First seen:
2021-07-21 08:17:52 UTC
File Type:
Binary (Archive)
Extracted files:
513
AV detection:
10 of 46 (21.74%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
android
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:adonunix2
Author:Tim Brown @timb_machine
Description:AD on UNIX

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

apk e1b46d3d5cb232880efd189482c49882178db717994d3f3663dfe4eca843bfa0

(this sample)

  
Delivery method
Distributed via web download

Comments