× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2528e2ba0049cfbcd9d7d1af81cd75aaebaa479482f3a8c97011540ee0b380bf
File name: 22f31813d98d8a65e7608f4377eb30bc221a4edd.apk
Detection ratio: 37 / 53
Analysis date: 2016-01-17 23:47:16 UTC ( 3 weeks, 6 days ago )
Antivirus Result Update
AVG Android/Deng.CZR 20160120
Ad-Aware Android.Trojan.Gepew.A 20160119
AegisLab Gepew 20160119
AhnLab-V3 Android-Downloader/Bankun.4dad 20160119
Alibaba A.H.Int.Fakeappstore 20160119
Antiy-AVL Trojan[Banker]/AndroidOS.Gepew.b 20160120
Arcabit Android.Trojan.Gepew.A 20160120
Avast Android:FakeKRB-E [Trj] 20160120
Avira ANDROID/Spy.Banker.AZ.Gen 20160120
Baidu-International Trojan.Win32.Agent.AaA 20160119
BitDefender Android.Trojan.Gepew.A 20160120
CAT-QuickHeal Android.Wroba.A 20160119
Comodo UnclassifiedMalware 20160119
Cyren AndroidOS/GenBl.0D28FA54!Olympus 20160120
DrWeb Android.BankBot.38.origin 20160120
ESET-NOD32 a variant of Android/Spy.Agent.AA 20160120
Emsisoft Android.Trojan.Gepew.A (B) 20160120
F-Prot AndroidOS/FakeBank.B 20160120
F-Secure Trojan-Spy:Android/Smforw.H 20160120
Fortinet Android/Banker.BF!tr 20160120
GData Android.Trojan.Gepew.A 20160120
Ikarus Trojan-Spy.AndroidOS.KrBanker 20160120
K7AntiVirus Trojan ( 0001140e1 ) 20160119
K7GW Trojan ( 0001140e1 ) 20160119
Kaspersky HEUR:Trojan-Banker.AndroidOS.Gepew.b 20160120
McAfee Artemis!0D28FA54F9C0 20160120
McAfee-GW-Edition Artemis!Trojan 20160120
MicroWorld-eScan Android.Trojan.Gepew.A 20160119
NANO-Antivirus Trojan.Android.Agent.cufbfn 20160120
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160119
Sophos Andr/FakeKRB-G 20160119
Symantec Android.Fakebank.B 20160119
Tencent SH.!Android.ISExtra.Gen.45 20160120
TotalDefense AndroidOS/Tnega.IUFKTGC 20160119
TrendMicro AndroidOS_BANKUN.HBT 20160120
TrendMicro-HouseCall AndroidOS_BANKUN.HBT 20160120
VIPRE Trojan.AndroidOS.Generic.A 20160120
Agnitum 20160119
Bkav 20160119
ByteHero 20160120
CMC 20160111
ClamAV 20160120
Jiangmin 20160120
Malwarebytes 20160120
Microsoft 20160119
Panda 20160119
SUPERAntiSpyware 20160120
TheHacker 20160119
VBA32 20160119
ViRobot 20160119
Zillya 20160119
Zoner 20160119
nProtect 20160119
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.example.adt. The internal version number of the application is 2. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
com.android.launcher.permission.UNINSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.READ_LOGS (read sensitive log data)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.SEND_SMS (send SMS messages)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_CONTACTS (read contact data)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.KILL_BACKGROUND_PROCESSES (kill background processes)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.MODIFY_PHONE_STATE (modify phone status)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.RESTART_PACKAGES (kill background processes)
Activities
com.example.adt.MainActivity
Services
com.example.adt.CoreService
Receivers
com.example.adt.SMSReceiver
com.example.adt.PhoneListener
com.example.adt.BootBroadcastReceiver
com.example.adt.LockReceiver
Activity-related intent filters
com.example.adt.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.example.adt.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
categories: android.intent.category.DEFAULT
com.example.adt.PhoneListener
actions: android.intent.action.PHONE_STATE
categories: android.intent.category.DEFAULT
com.example.adt.LockReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.example.adt.BootBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED, cn.gx3.notify, android.intent.action.USER_PRESENT
categories: android.intent.category.HOME
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
464558
Highest datetime
2013-12-14 18:34:52
Lowest datetime
2013-12-14 18:34:50
Contained files by extension
png
8
xml
4
dex
1
MF
1
RSA
1
ini
1
SF
1
Contained files by type
PNG
8
unknown
5
XML
4
DEX
1
File identification
MD5 0d28fa54f9c0d41801e8fb5a7b0433dd
SHA1 22f31813d98d8a65e7608f4377eb30bc221a4edd
SHA256 2528e2ba0049cfbcd9d7d1af81cd75aaebaa479482f3a8c97011540ee0b380bf
ssdeep
3072:HOWO1HKgvuysqBbQ7EFIIP1OM9QANSVGk9bSUWBtVUJmGddmQk07eZ6Rj:khvuysgRaINN94vDEtVimGOQ04Rj

File size 225.4 KB ( 230785 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2013-12-20 07:36:49 UTC ( 2 years, 1 month ago )
Last submission 2015-12-22 20:29:25 UTC ( 1 month, 3 weeks ago )
File names 0D28FA54F9C0D41801E8FB5A7B0433DD.apk
N17.apk
0D28FA54F9C0D41801E8FB5A7B0433DD.apk
2528e2ba0049cfbcd9d7d1af81cd75aaebaa479482f3a8c97011540ee0b380bf.log
0D28FA54F9C0D41801E8FB5A7B0433DD.apk
0D28FA54F9C0D41801E8FB5A7B0433DD.apk
0d28fa54f9c0d41801e8fb5a7b0433dd.apk
J58.apk
2528e2ba0049cfbcd9d7d1af81cd75aaebaa479482f3a8c97011540ee0b380bf
FakebankB.apk
N17.apk
22f31813d98d8a65e7608f4377eb30bc221a4edd.apk
3145500
15.txt
0d28fa54f9c0d41801e8fb5a7b0433dd.apk
0055.apk
M48.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.example.adt/.CoreService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.
Contacted URLs
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=686747156593312&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=686747156593312&t=1349803205271
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=593039056392020&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803212361
http://www.slmoney.co.kr/index.php?m=Api&a=SMSReceiver&imsi=593039056392020&number=15555215554&from=77846&content=Certainly%2C+madam.
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803214371
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=1&number=15555215554&imsi=593039056392020&issms=1&iscall=0&capp=&sapp=&t=1349803215433
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803216373
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803218381
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803220391
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=593039056392020&issms=1&iscall=0&capp=&sapp=&t=1349803220500
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803222401
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803224411
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=593039056392020&issms=1&iscall=0&capp=&sapp=&t=1349803225572
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803226421
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803228431
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803230441
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=593039056392020&issms=1&iscall=0&capp=&sapp=&t=1349803230634
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=593039056392020&t=1349803232443