× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 032a095067442d60d0df9fadab07553152e5500a67fc95084441752eafd43f70
File name: Pincer2D66.apk
Detection ratio: 37 / 54
Analysis date: 2016-08-06 13:56:23 UTC ( 3 weeks, 1 day ago )
Antivirus Result Update
AVG Android/G2P.KR.528067F9CDB6 20160806
AVware Trojan.AndroidOS.Generic.A 20160806
Ad-Aware Android.Trojan.InfoStealer.AZ 20160806
AegisLab Troj.Spy.Androidos!c 20160806
AhnLab-V3 Android-Trojan/Pincer.8de8 20160806
Alibaba A.H.Pri.Pincer 20160805
Antiy-AVL Trojan[Backdoor]/AndroidOS.Pincer.a 20160806
Arcabit Android.Trojan.InfoStealer.AZ 20160806
Avast Android:SecCert-D [Trj] 20160806
Avira (no cloud) ANDROID/SecCert.A.3 20160806
BitDefender Android.Trojan.InfoStealer.AZ 20160806
CAT-QuickHeal Android.Pincer.A 20160805
Comodo UnclassifiedMalware 20160806
Cyren AndroidOS/GenBl.2D66D794!Olympus 20160806
DrWeb Android.Backdoor.15.origin 20160806
ESET-NOD32 Android/SecCert.A 20160806
Emsisoft Android.Trojan.InfoStealer.AZ (B) 20160806
F-Prot AndroidOS/Pincer.A 20160806
F-Secure Trojan:Android/Pincer.A 20160806
Fortinet Android/Pincer.A!tr.spy 20160806
GData Android.Trojan.InfoStealer.AZ 20160806
Ikarus AndroidOS.Pincer.A 20160806
Jiangmin Backdoor/AndroidOS.gv 20160806
K7AntiVirus Trojan ( 0040f3971 ) 20160806
K7GW Trojan ( 0040f3971 ) 20160806
Kaspersky HEUR:Trojan-Spy.AndroidOS.SmsThief.fs 20160806
McAfee Artemis!2D66D7942148 20160806
eScan Android.Trojan.InfoStealer.AZ 20160806
NANO-Antivirus Trojan.Android.Pincer.cwzgiz 20160806
Qihoo-360 Trojan.Android.Gen 20160806
Sophos Andr/Pincer-A 20160806
Symantec Android.Malapp 20160806
Tencent SH.!Android.GenA.1a6ae 20160806
TotalDefense AndroidOS/Tnega.KNRNVS 20160805
TrendMicro ANDROIDOS_STEALER.VTD 20160806
TrendMicro-HouseCall ANDROIDOS_STEALER.VTD 20160806
Zillya Downloader.OpenConnection.JS.145093 20160806
ALYac 20160806
Baidu 20160806
Bkav 20160806
CMC 20160804
Kingsoft 20160806
Malwarebytes 20160806
McAfee-GW-Edition 20160806
Microsoft 20160806
Panda 20160806
SUPERAntiSpyware 20160806
TheHacker 20160806
VBA32 20160805
VIPRE 20160806
ViRobot 20160806
Yandex 20160805
Zoner 20160806
nProtect 20160805
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.security.cert. The internal version number of the application is 11. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 1. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.READ_LOGS (read sensitive log data)
android.permission.CALL_PRIVILEGED (directly call any phone numbers)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.MODIFY_PHONE_STATE (modify phone status)
Activities
com.security.cert.ui.MainActivity
com.security.cert.ui.UssdActivity
com.security.cert.ui.MessageDialogActivity
Services
com.security.cert.services.CheckCommandsService
com.security.cert.services.CheckQueueService
com.security.cert.services.USSDDumbExtendedNetworkService
Receivers
com.security.cert.services.ReCheckCommandReceiver
com.security.cert.services.ReSendQueueReceiver
com.security.cert.services.SmsSentReceiver
com.security.cert.services.SmsReceiver
com.security.cert.services.PhoneCallReceiver
com.security.cert.services.OnBootReceiver
Service-related intent filters
com.security.cert.services.USSDDumbExtendedNetworkService
actions: com.android.ussd.IExtendedNetworkService
categories: android.intent.category.DEFAULT
Activity-related intent filters
com.security.cert.ui.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.security.cert.services.OnBootReceiver
actions: android.intent.action.BOOT_COMPLETED
com.security.cert.services.ReCheckCommandReceiver
actions: android.intent.action.RE_CHECK_COMMAND
com.security.cert.services.ReSendQueueReceiver
actions: android.intent.action.RE_SEND_QUEUE
com.security.cert.services.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.security.cert.services.SmsSentReceiver
actions: android.intent.action.SMS_SENT
com.security.cert.services.PhoneCallReceiver
actions: android.intent.action.PHONE_STATE
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
67870
Highest datetime
2013-03-29 15:39:22
Lowest datetime
2013-03-26 01:27:20
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
Compressed bundles
File identification
MD5 2d66d7942148de2d9f08eab403921c89
SHA1 2157fd7254210ef2e8b09493d0e1be3b70d6ce69
SHA256 032a095067442d60d0df9fadab07553152e5500a67fc95084441752eafd43f70
ssdeep
768:Po3uzMY9YvJG80T44BKi+BgblAA34e3OZ5grN4eGp/WIPnri73k5aHN+Js45:Po3uzMh4oSlxIAGqN4ZNru73icEb

File size 38.3 KB ( 39207 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android ext-prg

VirusTotal metadata
First submission 2013-04-02 05:58:36 UTC ( 3 years, 4 months ago )
Last submission 2016-06-21 02:26:55 UTC ( 2 months, 1 week ago )
File names 2D66D7942148DE2D9F08EAB403921C89.ex
Recent38.apk
2d66d7942148de2d9f08eab403921c89.virus
Pincer2D66.apk
J163.apk
2157fd7254210ef2e8b09493d0e1be3b70d6ce69
VirusShare_2d66d7942148de2d9f08eab403921c89.apk
Recent-29-b.apk
Pincer2D66.apk
1403172014.07.log
Recent-29-b.apk
2d66d7942148de2d9f08eab403921c89.apk
N119.apk
032A095067442D60D0DF9FADAB07553152E5500A67FC95084441752EAFD43F70.APK.log
2157fd7254210ef2e8b09493d0e1be3b70d6ce69.apk
M154.apk
Certificate.apk
Recent38.apk
2d66d7942148de2d9f08eab403921c89
Certificate_com.security.cert.apk
Recent38.apk
2D66D7942148DE2D9F08EAB403921C89.apk
vti-rescan
N119.apk
Recent-29-b.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.security.cert/.services.CheckCommandsService;end
#Intent;component=com.security.cert/.services.CheckQueueService;end
External programs launched
logcat -d USSDDumbExtendedNetworkService:I *:S
Accessed files
/system/app/Superuser.apk
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.