× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 06dee8adbb56e08ab3460e4576ae073b3a8400cef0550c422ff5edbd641ee78b
File name: maggie_eckford_tell_me_how_to_feel_official.mp3.apk
Detection ratio: 30 / 61
Analysis date: 2018-01-17 14:00:26 UTC ( 1 year ago )
Antivirus Result Update
AegisLab Troj.Androidos.Agent!c 20180117
AhnLab-V3 Android-Trojan/Boosad.113de 20180117
Antiy-AVL Trojan/Android.TSGeneric 20180117
Arcabit Android.Trojan.Downloader.CI 20180117
Avira (no cloud) ADWARE/ANDR.MobiDash.N.Gen 20180117
AVware Trojan.AndroidOS.Generic.A 20180103
BitDefender Android.Trojan.Downloader.CI 20180117
CAT-QuickHeal Android.Axent.GEN4531 20180117
ClamAV Andr.Malware.Agent-1515651 20180117
Cyren ZIP/Trojan.MWEN-8 20180117
DrWeb Adware.PhoneAds.3.origin 20180117
Emsisoft Android.Trojan.Downloader.CI (B) 20180117
ESET-NOD32 a variant of Android/AdDisplay.MobiDash.F potentially unwanted 20180117
Fortinet Adware/MobiDash!Android 20180117
GData Android.Trojan.Downloader.CI 20180117
Ikarus PUA.AndroidOS.Mobidash 20180117
K7GW Trojan ( 004df3a51 ) 20180117
Kaspersky not-a-virus:HEUR:AdWare.AndroidOS.Boomp.a 20180117
MAX malware (ai score=86) 20180117
McAfee Artemis!F2CD9C11318B 20180117
eScan Android.Trojan.Downloader.CI 20180117
NANO-Antivirus Trojan.Android.PhoneAds.efswph 20180117
Qihoo-360 Trojan.Android.Gen 20180117
Sophos AV Andr/Axent-CE 20180117
Symantec Trojan.Gen.2 20180117
Tencent a.gray.andrsca.f 20180117
TrendMicro-HouseCall Suspicious_GEN.F47V1020 20180117
Trustlook Android.PUA.General 20180117
WhiteArmor Malware.HighConfidence 20180110
ZoneAlarm by Check Point not-a-virus:HEUR:AdWare.AndroidOS.Boomp.a 20180117
Ad-Aware 20180117
Alibaba 20180117
ALYac 20180117
Avast 20180117
Avast-Mobile 20180117
AVG 20180117
Baidu 20180117
Bkav 20180117
CMC 20180116
Comodo 20180117
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180117
eGambit 20180117
Endgame 20171130
F-Prot 20180117
F-Secure 20180117
Sophos ML 20170914
Jiangmin 20180117
K7AntiVirus 20180117
Kingsoft 20180117
Malwarebytes 20180117
McAfee-GW-Edition 20180117
Microsoft 20180117
nProtect 20180117
Palo Alto Networks (Known Signatures) 20180117
Panda 20180117
Rising 20180117
SentinelOne (Static ML) 20180115
SUPERAntiSpyware 20180117
Symantec Mobile Insight 20180117
TheHacker 20180115
VBA32 20180117
VIPRE 20180117
ViRobot 20180117
Webroot 20180117
Yandex 20180112
Zillya 20180117
Zoner 20180117
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.android.panel.settings. The internal version number of the application is 125. The displayed version string of the application is 25. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.BATTERY_STATS (modify battery statistics)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
a.b.c.d.m
a.b.c.d.Boost
Services
a.b.c.d.s
Receivers
a.b.c.d.b
Receiver-related intent filters
a.b.c.d.b
actions: android.intent.action.REBOOT, android.intent.action.ACTION_SHUTDOWN, android.intent.action.QUICKBOOT_POWEROFF, android.intent.action.BOOT_COMPLETED, android.intent.action.ACTION_PACKAGE_FIRST_LAUNCH, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED, android.intent.action.PACKAGE_RESTARTED, android.intent.action.INSTALL_PACKAGE, android.intent.action.UNINSTALL_PACKAGE, android.intent.action.ACTION_POWER_CONNECTED, android.intent.action.ACTION_POWER_DISCONNECTED, android.net.wifi.STATE_CHANGE, android.net.wifi.WIFI_STATE_CHANGED, android.net.wifi.supplicant.CONNECTION_CHANGE, android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BATTERY_LOW, android.intent.action.BATTERY_OKAY
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
282830
Highest datetime
2015-09-09 21:05:04
Lowest datetime
2015-09-09 20:04:52
Contained files by extension
png
9
xml
4
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
9
XML
4
unknown
4
DEX
1
Compressed bundles
File identification
MD5 f2cd9c11318b1ceaa5370c673727fb5b
SHA1 bbc7c08d17820cd594a04e4b96a4f42d96b037a3
SHA256 06dee8adbb56e08ab3460e4576ae073b3a8400cef0550c422ff5edbd641ee78b
ssdeep
3072:9vCbwR6KxWJbwRH3YRjYd6YS/cpqDGQkd6O+GN2jSA1Ni3jB3MGeeBstfPoB/MA:oNcGEd6F0tPBfAW398GePob

File size 175.2 KB ( 179418 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2015-09-10 14:02:02 UTC ( 3 years, 4 months ago )
Last submission 2016-07-08 19:05:24 UTC ( 2 years, 6 months ago )
File names saro_vardanyan_ehto_nashe_leto_kajfuj_tantsuj_2014_xit.mp3.apk
com.android.panel.settings-1.apk
queen_impromptu_live_in_tokyo_09_05_1985.mp3.apk
baha_men_you_all_dat.mp3.apk
sanders_bohlke_the_weight_of_us.mp3.apk
coldplay_paradise.mp3.apk
sandersbohlke_theweightofus.mp3.apk
maggie_eckford_tell_me_how_to_feel_official.mp3.apk
Malware_ZIP_06dee8adbb56e08ab3460e4576ae073b3a8400cef0550c422ff5edbd641ee78b
.mp3.apk
maggieeckford_tellmehowtofeelofficial.mp3.apk
standartnaya_melodiya_ajfona_iphone_marimba_melodiya_na_telefon.mp3.apk
ckachat_mp3_moss_i_apologise_dear_simon_ost_jongens_besplatnye_novinki_pesen_2015_mp3sajt.mp3.apk
filename
hiiro_no_kakera_2.mp3.apk
Music Player_25.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.android.panel.settings/a.b.c.d.s;end
Opened files
/mnt/sdcard/Download
/data/data/com.android.panel.settings/cache/volley
Accessed files
/data/data/com.android.panel.settings/cache/volley
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://setup.phoneadsmobile.net/client.config/?app=pndr&format=json&advert_key=ZWMwMDBhMDBjZTAwMDJlNDAwMDAwMmY1MDAwMmY1MDAwMmY1NDkxOWQzZGI0Nw==&version=25&ad=25&uid=F9C159DF89A5C1E4C7FB222532E3E989-C71660F66FE7E4B312C2BD837488D7D92D9DB5EA
http://setup.phoneadsmobile.net/client.config/?app=pndr2&format=json&advert_key=ZWMwMDBhMDBjZTAwMDJlNDAwMDAwMmY1MDAwMmY1MDAwMmY1NDkxOWQzZGI0Nw==&version=25&ad=25&uid=F9C159DF89A5C1E4C7FB222532E3E989-C71660F66FE7E4B312C2BD837488D7D92D9DB5EA
Accessed URIs
http://setup.phoneadsmobile.net/client.config/?app=pndr&format=json&advert_key=ZWMwMDBhMDBjZTAwMDJlNDAwMDAwMmY1MDAwMmY1MDAwMmY1NDkxOWQzZGI0Nw==&version=25&ad=25&uid=F9C159DF89A5C1E4C7FB222532E3E989-C71660F66FE7E4B312C2BD837488D7D92D9DB5EA
http://setup.phoneadsmobile.net/client.config/?app=pndr2&format=json&advert_key=ZWMwMDBhMDBjZTAwMDJlNDAwMDAwMmY1MDAwMmY1MDAwMmY1NDkxOWQzZGI0Nw==&version=25&ad=25&uid=F9C159DF89A5C1E4C7FB222532E3E989-C71660F66FE7E4B312C2BD837488D7D92D9DB5EA