× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 03c1b44c94c86c3137862c20f9f745e0f89ce2cdb778dc6466a06a65b7a591ae
File name: b226a66a2796e922302b96ae81540d5c.apk
Detection ratio: 41 / 56
Analysis date: 2016-05-06 06:11:39 UTC ( 2 weeks, 5 days ago )
Antivirus Result Update
AVG Android/Fobus 20160506
AVware Trojan.AndroidOS.Generic.A 20160506
Ad-Aware Android.Trojan.FakeApp.K 20160506
AegisLab FakeToken 20160506
AhnLab-V3 Android-Trojan/FakeInst.eb0d 20160505
Alibaba A.H.Pay.Erop.YG 20160506
Antiy-AVL Trojan[Banker]/AndroidOS.Faketoken.b 20160506
Arcabit Android.Trojan.FakeApp.K 20160506
Avast Android:TrojanSMS-PG [Trj] 20160506
Avira (no cloud) ANDROID/TrojanSMS.Agent.ANZ.Gen 20160506
Baidu-International Trojan.Win32.Agent.AaA 20160505
BitDefender Android.Trojan.FakeApp.K 20160506
CAT-QuickHeal Android.FakeInst.AC 20160505
ClamAV Andr.Trojan.Stels-1 20160506
Comodo UnclassifiedMalware 20160506
Cyren AndroidOS/FakeToken.B 20160506
DrWeb Android.SmsSend.471.origin 20160506
ESET-NOD32 a variant of Android/TrojanSMS.Agent.KR 20160506
Emsisoft Android.Trojan.FakeApp.K (B) 20160503
F-Prot AndroidOS/FakeToken.B 20160506
F-Secure Trojan:Android/FakeToken.C 20160506
Fortinet Android/Agent.BE!tr 20160506
GData Android.Trojan.FakeApp.K 20160506
Ikarus Trojan-SMS.AndroidOS.Agent 20160506
Jiangmin Trojan/Banker.AndroidOS.z 20160506
K7AntiVirus Trojan ( 0040f4111 ) 20160505
K7GW Trojan ( 0040f4111 ) 20160506
Kaspersky HEUR:Trojan-SMS.AndroidOS.FakeInst.eg 20160506
McAfee Artemis!B226A66A2796 20160506
eScan Android.Trojan.FakeApp.K 20160506
Microsoft Trojan:AndroidOS/SeltSMSer.A 20160505
NANO-Antivirus Trojan.Android.Agent.cujubj 20160506
Qihoo-360 Trojan.Android.Gen 20160506
Rising Privacy.Agent!1.9DA0 20160506
Sophos Andr/FakeIns-AB 20160506
Symantec Trojan.Gen.2 20160506
Tencent SH.!Android.MExtra.Gen.69b 20160506
TotalDefense AndroidOS/Tnega.RLRWHbB 20160506
TrendMicro ANDROIDOS_FAKETOKEN.HRX 20160506
TrendMicro-HouseCall ANDROIDOS_FAKETOKEN.HRX 20160506
VIPRE Trojan.AndroidOS.Generic.A 20160506
ALYac 20160506
Baidu 20160505
CMC 20160504
Kingsoft 20160506
Malwarebytes 20160506
McAfee-GW-Edition 20160505
Panda 20160505
SUPERAntiSpyware 20160506
TheHacker 20160505
VBA32 20160505
ViRobot 20160506
Yandex 20160502
Zillya 20160505
Zoner 20160506
nProtect 20160504
The file being studied is Android related! APK Android file more specifically. The application's main package name is android.systempack.ins. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 4. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.INSTALL_PACKAGES (directly install applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PRIVILEGED (directly call any phone numbers)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.DELETE_PACKAGES (delete applications)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
Activities
app.opera.MainActivity
Services
ru.stels2.MainService
Receivers
ru.stels2.MainReceiver
Activity-related intent filters
app.opera.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
ru.stels2.MainReceiver
actions: android.provider.Telephony.SMS_RECEIVED, custom.alarm, custom.alarm.info, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, android.intent.action.PHONE_STATE
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
8
Uncompressed size
629320
Highest datetime
2013-03-01 06:50:38
Lowest datetime
2013-03-01 06:35:42
Contained files by extension
xml
1
dex
1
MF
1
RSA
1
SF
1
png
1
Contained files by type
unknown
5
XML
1
DEX
1
PNG
1
Compressed bundles
File identification
MD5 b226a66a2796e922302b96ae81540d5c
SHA1 670503ed863397d64bfe24ca0940be9c23682ae4
SHA256 03c1b44c94c86c3137862c20f9f745e0f89ce2cdb778dc6466a06a65b7a591ae
ssdeep
3072:5D0di20jVxxjGjEnQpI3uGNwV84nYChANXWfN6gV72O/PS4oTcr:aUVVQ23VwV8Wmm6gpdPBecr

File size 160.4 KB ( 164210 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android

VirusTotal metadata
First submission 2013-03-12 15:24:01 UTC ( 3 years, 2 months ago )
Last submission 2016-04-05 00:38:19 UTC ( 1 month, 3 weeks ago )
File names Recent31.apk
1403111101.57.log
b226a66a2796e922302b96ae815
flashplayer.android.update.apk
Recent37-a.apk
b226a66a2796e922302b96ae81540d5c
0024.apk
Recent37-a.apk
b226a66a2796e922302b96ae81540d5c.log
b226a66a2796e922302b96ae81540d5c_10.apk
b226a66a2796e922302b96ae81540d5c.apk
03C1B44C94C86C3137862C20F9F745E0F89CE2CDB778DC6466A06A65B7A591AE.APK.log
N116.apk
Recent31.apk
FLASHPLAYER.UPDATE.apk
N116.apk
B226A66A2796E922302B96AE81540D5C.apk
stels.apk
M151.apk
J160.apk
App_1.apk
vti-rescan
flashplayer.apk
b226a66a2796e922302b96ae81540d5c.apk
flshlyerndroidudte.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.