× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 077c7b3dd036c70cc49c9c34443685326b515860232be19861947b428fb81ad4
File name: F.apk
Detection ratio: 38 / 63
Analysis date: 2017-12-28 12:24:13 UTC ( 10 months, 4 weeks ago )
Antivirus Result Update
AegisLab Backdoor.AndroidOS.Climap.a!c 20171228
AhnLab-V3 Android-Spyware/Androrat.2f84 20171228
Alibaba A.H.Rem.Climap.C 20171228
Antiy-AVL Trojan[Backdoor]/Android.Climap 20171228
Arcabit Android.Riskware.AndroRat.A 20171228
Avast Android:Androrat-I [Trj] 20171228
Avast-Mobile Android:Androrat-I [Trj] 20171228
AVG Android:Androrat-I [Trj] 20171228
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20171228
Baidu Android.Trojan.AndroRAT.k 20171227
BitDefender Android.Riskware.AndroRat.A 20171228
CAT-QuickHeal Android.Climap.GEN212 20171228
ClamAV Andr.Trojan.Androrat-1 20171228
Cyren AndroidOS/AndroRAT.A 20171228
DrWeb Android.Androrat.1.origin 20171228
Emsisoft Android.Riskware.AndroRat.A (B) 20171228
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20171228
F-Prot AndroidOS/AndroRAT.A 20171228
F-Secure Monitoring-Tool:Android/AndroRat.B 20171228
Fortinet Android/AndroRat.A!tr 20171228
GData Android.Riskware.AndroRat.A 20171228
Ikarus Trojan-Spy.AndroidOS.Androrat 20171228
K7GW Spyware ( 004d4a4e1 ) 20171228
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20171228
MAX malware (ai score=73) 20171228
McAfee Artemis!437FCE5D5836 20171228
McAfee-GW-Edition Artemis!PUP 20171228
Microsoft MonitoringTool:AndroidOS/AndroRat 20171228
NANO-Antivirus Trojan.Android.TrjGen.dzzhxe 20171228
Qihoo-360 Trojan.Android.Gen 20171228
Rising Backdoor.Android.Climap.a (CLASSIC) 20171228
Sophos AV Andr/AndroRat-C 20171228
Symantec Trojan.Gen.2 20171227
Symantec Mobile Insight Spyware:MobileSpy 20171227
Tencent Trojan.Android.Climap.a 20171228
Trustlook Android.Malware.Spyware 20171228
WhiteArmor Malware.HighConfidence 20171226
ZoneAlarm by Check Point HEUR:Backdoor.AndroidOS.Climap.a 20171228
Ad-Aware 20171225
ALYac 20171228
AVware 20171228
Bkav 20171228
CMC 20171228
Comodo 20171228
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171228
eGambit 20171228
Endgame 20171130
Sophos ML 20170914
Jiangmin 20171228
K7AntiVirus 20171228
Kingsoft 20171228
Malwarebytes 20171228
eScan 20171228
nProtect 20171228
Palo Alto Networks (Known Signatures) 20171228
Panda 20171227
SentinelOne (Static ML) 20171224
SUPERAntiSpyware 20171228
TheHacker 20171226
TotalDefense 20171228
TrendMicro 20171228
TrendMicro-HouseCall 20171228
VBA32 20171228
VIPRE 20171228
ViRobot 20171228
Webroot 20171228
Yandex 20171225
Zillya 20171228
Zoner 20171228
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.RECORD_AUDIO (record audio)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECEIVE_SMS (receive SMS)
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118700
Highest datetime
2015-05-21 07:14:18
Lowest datetime
2015-05-21 06:14:18
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 437fce5d5836d149a1416137314f1a4e
SHA1 4beea49ec63e5c3de2c0a2435f62f7672bab1f36
SHA256 077c7b3dd036c70cc49c9c34443685326b515860232be19861947b428fb81ad4
ssdeep
1536:Z3HqMcjfKWKIrfvlJcKd+RU47wpoc3Thz6jfSz9DmDLi4U:5KMcjfXK2nHco+yIwpoc3Thz6jfShuU

File size 67.0 KB ( 68631 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-05-21 18:01:43 UTC ( 3 years, 6 months ago )
Last submission 2015-05-21 18:01:43 UTC ( 3 years, 6 months ago )
File names F.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end