× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 279af458993acbb78fcf67a8049089538de7a7e26716eaa9430749681ae91be2
File name: 792BBB3DDC46E3D0E640D32977434ACA.apk
Detection ratio: 39 / 57
Analysis date: 2016-04-29 14:04:36 UTC ( 4 days, 23 hours ago )
Antivirus Result Update
AVG Android/Deng.VWU 20160429
AVware Trojan.AndroidOS.Generic.A 20160429
Ad-Aware Android.Trojan.Gepew.A 20160429
AegisLab Gepew 20160429
AhnLab-V3 Android-Downloader/Bankun.4dad 20160429
Alibaba A.H.Int.Fakeappstore 20160429
Antiy-AVL Trojan[Banker]/AndroidOS.Gepew.b 20160429
Arcabit Android.Trojan.Gepew.A 20160429
Avast Android:FakeKRB-E [Trj] 20160429
Avira (no cloud) ANDROID/Spy.Banker.AZ.Gen 20160429
Baidu-International Trojan.Win32.Agent.AaA 20160429
BitDefender Android.Trojan.Gepew.A 20160429
CAT-QuickHeal Android.Wroba.A 20160429
Comodo UnclassifiedMalware 20160429
Cyren AndroidOS/GenBl.792BBB3D!Olympus 20160429
DrWeb Android.Spy.40.origin 20160429
ESET-NOD32 a variant of Android/Spy.Agent.AA 20160429
Emsisoft Android.Trojan.Gepew.A (B) 20160429
F-Prot AndroidOS/FakeBank.B 20160429
F-Secure Trojan-Spy:Android/Smforw.H 20160429
Fortinet Android/Banker.AC!tr 20160429
GData Android.Trojan.Gepew.A 20160429
Ikarus Trojan-Spy.AndroidOS.KrBanker 20160429
K7AntiVirus Trojan ( 0001140e1 ) 20160429
K7GW Trojan ( 0001140e1 ) 20160429
Kaspersky HEUR:Trojan-Banker.AndroidOS.Gepew.b 20160429
Kingsoft Android.Troj.hh_FakeADT.a.(kcloud) 20160429
McAfee Artemis!792BBB3DDC46 20160429
McAfee-GW-Edition Artemis!Trojan 20160429
eScan Android.Trojan.Gepew.A 20160429
NANO-Antivirus Trojan.Android.Agent.cufbfn 20160429
Qihoo-360 Trojan.Android.Gen 20160429
Sophos Andr/FakeKRB-G 20160429
Symantec Android.Fakebank.B 20160429
Tencent SH.!Android.ISExtra.Gen.45 20160429
TotalDefense AndroidOS/Tnega.IUFKTGC 20160426
TrendMicro AndroidOS_BANKUN.HBT 20160429
TrendMicro-HouseCall AndroidOS_BANKUN.HBT 20160429
VIPRE Trojan.AndroidOS.Generic.A 20160429
ALYac 20160429
Baidu 20160429
Bkav 20160429
CMC 20160429
ClamAV 20160429
Jiangmin 20160429
Malwarebytes 20160429
Microsoft 20160429
Panda 20160428
Rising 20160429
SUPERAntiSpyware 20160429
TheHacker 20160429
VBA32 20160429
ViRobot 20160429
Yandex 20160428
Zillya 20160429
Zoner 20160429
nProtect 20160429
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.example.adt. The internal version number of the application is 2. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
com.android.launcher.permission.UNINSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.READ_LOGS (read sensitive log data)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.SEND_SMS (send SMS messages)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_CONTACTS (read contact data)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.KILL_BACKGROUND_PROCESSES (kill background processes)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.MODIFY_PHONE_STATE (modify phone status)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.RESTART_PACKAGES (kill background processes)
Activities
com.example.adt.MainActivity
Services
com.example.adt.CoreService
Receivers
com.example.adt.SMSReceiver
com.example.adt.PhoneListener
com.example.adt.BootBroadcastReceiver
com.example.adt.LockReceiver
Activity-related intent filters
com.example.adt.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.example.adt.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
categories: android.intent.category.DEFAULT
com.example.adt.PhoneListener
actions: android.intent.action.PHONE_STATE
categories: android.intent.category.DEFAULT
com.example.adt.LockReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.example.adt.BootBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED, cn.gx3.notify, android.intent.action.USER_PRESENT
categories: android.intent.category.HOME
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
464558
Highest datetime
2013-12-21 17:23:54
Lowest datetime
2013-12-21 17:23:52
Contained files by extension
png
8
xml
4
dex
1
MF
1
RSA
1
ini
1
SF
1
Contained files by type
PNG
8
unknown
5
XML
4
DEX
1
File identification
MD5 792bbb3ddc46e3d0e640d32977434aca
SHA1 4cf53b596e60ef3d2acbd52e03b8c36f765a5982
SHA256 279af458993acbb78fcf67a8049089538de7a7e26716eaa9430749681ae91be2
ssdeep
3072:t+SO1HKgvuysqBbQ7EFIIP1OM9QANSVGk9bSUWBtVUJmGddmQo070JgrX:ChvuysgRaINN94vDEtVimGOQSKrX

File size 225.4 KB ( 230785 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2013-12-22 10:25:59 UTC ( 2 years, 4 months ago )
Last submission 2015-12-12 17:37:56 UTC ( 4 months, 3 weeks ago )
File names 279af458993acbb78fcf67a8049089538de7a7e26716eaa9430749681ae91be2.log
792bbb3ddc46e3d0e640d32977434aca.apk
792bbb3ddc46e3d0e640d32977434aca
0176.apk
792bbb3ddc46e3d0e640d32977434aca.apk
792BBB3DDC46E3D0E640D32977434ACA.apk
N18.apk
M49.apk
4cf53b596e60ef3d2acbd52e03b8c36f765a5982.apk
J59.apk
792BBB3DDC46E3D0E640D32977434ACA.apk
3147116
N18.apk
16.txt
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.example.adt/.CoreService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.
Contacted URLs
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=978786000107458&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=978786000107458&t=1349802471208
http://www.slmoney.co.kr/index.php?m=Api&a=Contact&status=1&imsi=943631043487174&number=15555215554&content=
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802478299
http://www.slmoney.co.kr/index.php?m=Api&a=SMSReceiver&imsi=943631043487174&number=15555215554&from=90437&content=12th.+Visited+Paramore.+All+well.
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802480308
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=1&number=15555215554&imsi=943631043487174&issms=1&iscall=0&capp=&sapp=&t=1349802481354
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802482318
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802484328
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802486338
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=943631043487174&issms=1&iscall=0&capp=&sapp=&t=1349802486403
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802488339
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802490349
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=943631043487174&issms=1&iscall=0&capp=&sapp=&t=1349802491484
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802492359
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802494369
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802496380
http://www.slmoney.co.kr/index.php?m=Api&a=Heartbeat&nettype=wap&mob=Nexus+S&version=15&newclient=0&number=15555215554&imsi=943631043487174&issms=1&iscall=0&capp=&sapp=&t=1349802496567
http://www.slmoney.co.kr/index.php?m=Api&a=Commend&number=15555215554&imsi=943631043487174&t=1349802498389