× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0840925753fbc8c68938090e5954ed289f6525cd29d8cf371a92d0839dcb8133
File name: o559rQ5skUHXFcsinSfo20160810-8319-1qti9xc
Detection ratio: 36 / 55
Analysis date: 2016-08-10 09:06:00 UTC ( 2 weeks, 1 day ago )
Antivirus Result Update
AVG Android/Deng.VWU 20160810
AVware Trojan.AndroidOS.Generic.A 20160810
Ad-Aware Android.Trojan.Gepew.A 20160810
AegisLab Troj.Banker.Androidos!c 20160810
AhnLab-V3 Android-Downloader/Bankun.4dad 20160810
Alibaba A.H.Int.Fakeappstore 20160810
Antiy-AVL Trojan[Banker]/AndroidOS.Gepew.b 20160810
Arcabit Android.Trojan.Gepew.A 20160810
Avast Android:FakeKRB-E [Trj] 20160810
Avira (no cloud) ANDROID/Spy.Banker.AZ.Gen 20160810
BitDefender Android.Trojan.Gepew.A 20160810
Bkav Android.Malware.SDi.2478 20160809
CAT-QuickHeal Android.Wroba.A 20160810
Comodo UnclassifiedMalware 20160810
Cyren AndroidOS/GenBl.4021A1E0!Olympus 20160810
DrWeb Android.BankBot.38.origin 20160810
ESET-NOD32 a variant of Android/Spy.Agent.AA 20160810
Emsisoft Android.Trojan.Gepew.A (B) 20160810
F-Prot AndroidOS/FakeBank.B 20160810
F-Secure Trojan-Spy:Android/Smforw.H 20160810
Fortinet Android/Banker.AC!tr 20160810
GData Android.Trojan.Gepew.A 20160810
Ikarus Trojan-Spy.AndroidOS.KrBanker 20160809
K7AntiVirus Trojan ( 0001140e1 ) 20160810
K7GW Trojan ( 0001140e1 ) 20160810
Kaspersky HEUR:Trojan-Banker.AndroidOS.Gepew.b 20160810
McAfee Artemis!4021A1E00B3A 20160810
McAfee-GW-Edition Artemis!Trojan 20160810
eScan Android.Trojan.Gepew.A 20160810
NANO-Antivirus Trojan.Android.Agent.cufbfn 20160810
Qihoo-360 Trojan.Android.Gen 20160810
Sophos Andr/FakeKRB-G 20160810
Tencent Trojan.Android.Agent.8C5D744F 20160810
TotalDefense AndroidOS/Tnega.IUFKTGC 20160808
TrendMicro AndroidOS_BANKUN.HBT 20160810
TrendMicro-HouseCall AndroidOS_BANKUN.HBT 20160810
ALYac 20160810
Baidu 20160809
CMC 20160804
ClamAV 20160810
Jiangmin 20160810
Kingsoft 20160810
Malwarebytes 20160810
Microsoft 20160810
Panda 20160809
SUPERAntiSpyware 20160810
Symantec 20160810
TheHacker 20160809
VBA32 20160810
VIPRE 20160810
ViRobot 20160810
Yandex 20160809
Zillya 20160809
Zoner 20160810
nProtect 20160809
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.example.adt. The internal version number of the application is 2. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
com.android.launcher.permission.UNINSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.READ_LOGS (read sensitive log data)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.SEND_SMS (send SMS messages)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_CONTACTS (read contact data)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.KILL_BACKGROUND_PROCESSES (kill background processes)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.MODIFY_PHONE_STATE (modify phone status)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.RESTART_PACKAGES (kill background processes)
Activities
com.example.adt.MainActivity
Services
com.example.adt.CoreService
Receivers
com.example.adt.SMSReceiver
com.example.adt.PhoneListener
com.example.adt.BootBroadcastReceiver
com.example.adt.LockReceiver
Activity-related intent filters
com.example.adt.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.example.adt.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
categories: android.intent.category.DEFAULT
com.example.adt.PhoneListener
actions: android.intent.action.PHONE_STATE
categories: android.intent.category.DEFAULT
com.example.adt.LockReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.example.adt.BootBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED, cn.gx3.notify, android.intent.action.USER_PRESENT
categories: android.intent.category.HOME
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
464558
Highest datetime
2013-12-09 23:28:28
Lowest datetime
2013-12-09 23:28:28
Contained files by extension
png
8
xml
4
dex
1
MF
1
RSA
1
ini
1
SF
1
Contained files by type
PNG
8
unknown
5
XML
4
DEX
1
File identification
MD5 4021a1e00b3abee730994f1ee17219b4
SHA1 0da6cae1357c6dbc3f795ca7733234fd96ff401c
SHA256 0840925753fbc8c68938090e5954ed289f6525cd29d8cf371a92d0839dcb8133
ssdeep
3072:wcwO1HKgvuysqBbQ7EFIIP1OM9QANSVGk9bSUWBtVUJmGddmQc07zTFKN:vhvuysgRaINN94vDEtVimGOQdhKN

File size 225.4 KB ( 230785 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2013-12-10 08:54:50 UTC ( 2 years, 8 months ago )
Last submission 2016-08-10 09:06:00 UTC ( 2 weeks, 1 day ago )
File names 4021a1e00b3abee730994f1ee17219b4.apk
4021a1e00b3abee730994f1ee17219b4.apk
J60.apk
N19.apk
3104000
0013.apk
0da6cae1357c6dbc3f795ca7733234fd96ff401c.apk
vti-rescan
N19.apk
M50.apk
4021A1E00B3ABEE730994F1EE17219B4.apk
0840925753fbc8c68938090e5954ed289f6525cd29d8cf371a92d0839dcb8133.log
o559rQ5skUHXFcsinSfo20160810-8319-1qti9xc
4021A1E00B3ABEE730994F1EE17219B4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.example.adt/.CoreService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=506793634093771&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=506793634093771&t=1350889548008
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=023607532178715&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=023607532178715&t=1350889555109