× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2c230d0fb40ecd956f23633040e3f293f6dd0621c6b265a0f75f2216fe812b41
File name: bd26435cc86f52939c9ec35621a0ebc9eb3c2bc9
Detection ratio: 34 / 56
Analysis date: 2016-01-19 00:27:30 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.Marcher.A 20160119
AegisLab Marcher 20160118
AhnLab-V3 Android-Trojan/Marcher.f767 20160118
Alibaba A.H.Pay.Marcher 20160118
Antiy-AVL Trojan[Banker:HEUR]/AndroidOS.Marcher.2 20160118
Arcabit Android.Trojan.Marcher.A 20160118
Avast Android:FakeDEB-A [Trj] 20160118
AVG Android/Deng.FYQ 20160118
Avira (no cloud) ANDROID/FakeInstall.BD.Gen 20160118
AVware Trojan.AndroidOS.Generic.A 20160111
Baidu-International Trojan.Win32.Agent.AaA 20160118
BitDefender Android.Trojan.Marcher.A 20160118
CAT-QuickHeal Android.Marcher.A 20160118
Comodo UnclassifiedMalware 20160118
Cyren AndroidOS/Banker.Marcher.A.gen!Eldorado 20160118
DrWeb Android.SmsSpy.88.origin 20160118
Emsisoft Android.Trojan.Marcher.A (B) 20160118
ESET-NOD32 a variant of Android/Spy.Banker.F 20160119
F-Secure Trojan:Android/Marcher.A 20160119
Fortinet Android/Marcher.A!tr 20160118
GData Android.Trojan.Marcher.A 20160119
Ikarus Trojan-Banker.AndroidOS.Marcher.A 20160119
K7GW Spyware ( 004c0f531 ) 20160118
Kaspersky HEUR:Trojan-Banker.AndroidOS.Marcher.b 20160119
McAfee Artemis!424EAD133C02 20160119
McAfee-GW-Edition Artemis!Trojan 20160119
eScan Android.Trojan.Marcher.A 20160119
NANO-Antivirus Trojan.Android.SmsSpy.cwzgmc 20160119
Qihoo-360 Trojan.Android.Gen 20160119
Rising APK:Trojan.Banker.j/Android!7.1694 [F] 20160118
Sophos AV Andr/SMStan-A 20160118
Tencent Android.Trojan.Fakeinstall.Pacc 20160117
VIPRE Trojan.AndroidOS.Generic.A 20160119
Zoner Trojan.AndroidOS.Marcher.A 20160118
Yandex 20160118
ALYac 20160119
Bkav 20160118
ByteHero 20160119
ClamAV 20160118
CMC 20160111
F-Prot 20160118
Jiangmin 20160119
K7AntiVirus 20160118
Malwarebytes 20160119
Microsoft 20160119
nProtect 20160118
Panda 20160118
SUPERAntiSpyware 20160118
Symantec 20160118
TheHacker 20160116
TotalDefense 20160118
TrendMicro 20160119
TrendMicro-HouseCall 20160119
VBA32 20160117
ViRobot 20160118
Zillya 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.avito. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 7. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.READ_CONTACTS (read contact data)
Activities
com.avito.MainActivity_
com.avito.StartActivity
com.avito.googleplay.DialogActivity
com.avito.googleplay.CommerzbankDialogActivity
Services
com.avito.MainService
com.avito.USSDService
com.avito.googleplay.GPService
Receivers
com.avito.SmsReceiver_
com.avito.BootReceiver
com.avito.ShutdownReceiver
com.avito.AdminReceiver
com.avito.googleplay.ServiceDestroyReceiver
com.avito.AlarmReceiver
Service-related intent filters
com.avito.USSDService
actions: com.android.ussd.IExtendedNetworkService
Activity-related intent filters
com.avito.MainActivity_
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.avito.AlarmReceiver
actions: MainActivity.AlarmAction
com.avito.AdminReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.avito.SmsReceiver_
actions: android.provider.Telephony.SMS_RECEIVED
com.avito.ShutdownReceiver
actions: android.intent.action.ACTION_SHUTDOWN, android.intent.action.QUICKBOOT_POWEROFF
com.avito.googleplay.ServiceDestroyReceiver
actions: com.KHLCert.gpservice
com.avito.BootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
40
Uncompressed size
1438496
Highest datetime
2015-08-10 11:24:04
Lowest datetime
2014-11-24 10:09:30
Contained files by extension
png
19
xml
14
ttf
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
19
XML
14
unknown
6
DEX
1
File identification
MD5 424ead133c02541910b16cb7471cb2f4
SHA1 1156c922ec623478456d01ea0a6caee1d6d56c45
SHA256 2c230d0fb40ecd956f23633040e3f293f6dd0621c6b265a0f75f2216fe812b41
ssdeep
12288:/hxjss3iSaH7iCjVC3lV7xbP/Deo1x73bowejJG2RllUH5ZEBe4RCTrBfRHAV:/s37fjVU/71J77s7Gu0Ako

File size 937.3 KB ( 959772 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
dyn-calls apk android sends-sms

VirusTotal metadata
First submission 2015-08-10 17:13:09 UTC ( 3 years, 3 months ago )
Last submission 2015-08-11 16:28:13 UTC ( 3 years, 3 months ago )
File names WhatsApp.apk
bd26435cc86f52939c9ec35621a0ebc9eb3c2bc9
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;launchFlags=0x10000000;component=com.avito/.googleplay.GPService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.
Dynamically called methods
android.content.SharedPreferences$Editor.apply
SMS sent
Destination number:
imei: 810487807539843, country: us, cell: Android, android: 4.0.4, model: samsung Nexus S
Contacted URLs
http://manaclubs.tk/li/get.php/ai=699
69643D366637643938633430303633663739303861646164363232326661613136303926696E666F3D696D65692533412B3831303438373830373533393834332532432B636F756E7472792533412B75732532432B63656C6C2533412B416E64726F69642532432B616E64726F69642533412B342E302E342532432B6D6F64656C2533412B73616D73756E672B4E657875732B53
http://manaclubs.tk/li/set_result.php
626F745F69643D366637643938633430303633663739303861646164363232326661613136303926726573756C743D72656E742532362532362532362B4F4B
http://manaclubs.tk/li/load_sms.php
626F745F69643D366637643938633430303633663739303861646164363232326661613136303926736D733D25374225323264617465253232253341313433393336343332323030302532432532326E756D6265722532322533412532323738353831253232253243253232746578742532322533412532324469642B796F752B6F6273657276652B7468652B636F6C6F7572253346253232253744