× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2c2d6caf2801070fef2e5cdacd215e2fad78713d06a307a4b92bc894012e1ad2
File name: Lol.apk
Detection ratio: 32 / 56
Analysis date: 2015-07-03 14:34:02 UTC ( 2 years, 1 month ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20150703
AegisLab SUSPICIOUS 20150703
AhnLab-V3 Android-Spyware/Androrat.2f84 20150703
Alibaba A.L.Rog.Androrat 20150630
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Climap.1 20150703
Arcabit Android.Riskware.AndroRat.A 20150630
Avast Android:Androrat-I [Trj] 20150703
AVG Android/SpyAgent 20150703
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20150703
Baidu-International Trojan.Android.AndroRAT.D 20150703
BitDefender Android.Riskware.AndroRat.A 20150703
CAT-QuickHeal Android.AndroRAT.A (PUP) 20150703
ClamAV Andr.Trojan.Androrat 20150703
Cyren AndroidOS/AndroRAT.A 20150703
DrWeb Program.Androrat.1.origin 20150703
ESET-NOD32 a variant of Android/Spy.AndroRAT.D 20150703
F-Prot AndroidOS/AndroRAT.A 20150703
F-Secure Monitoring-Tool:Android/AndroRat.B 20150703
Fortinet Android/AndroRat.A!tr 20150703
GData Android.Riskware.AndroRat.A 20150702
Ikarus Trojan-Spy.AndroidOS.Androrat 20150703
K7GW Trojan ( 0048d4dc1 ) 20150703
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20150703
McAfee Artemis!CA08CC8D7300 20150703
McAfee-GW-Edition Artemis 20150702
Microsoft MonitoringTool:AndroidOS/AndroRat 20150703
eScan Android.Riskware.AndroRat.A 20150703
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20150703
Qihoo-360 Win32/Trojan.794 20150703
Rising NORMAL:Backdoor.Android.Climap.a!1616537 20150703
Sophos AV Andr/AndroRat-C 20150703
Zoner Trojan.AndroidOS.AndroRat.A 20150703
Yandex 20150630
ALYac 20150703
AVware 20150703
Bkav 20150703
ByteHero 20150703
Comodo 20150703
Emsisoft 20150703
Jiangmin 20150702
K7AntiVirus 20150703
Kingsoft 20150703
Malwarebytes 20150703
nProtect 20150703
Panda 20150703
SUPERAntiSpyware 20150703
Symantec 20150703
Tencent 20150703
TheHacker 20150702
TotalDefense 20150703
TrendMicro 20150703
TrendMicro-HouseCall 20150703
VBA32 20150703
VIPRE 20150703
ViRobot 20150703
Zillya 20150702
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Risk summary
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECORD_AUDIO (record audio)
Permission-related API calls
ACCESS_NETWORK_STATE
RECORD_AUDIO
SEND_SMS
VIBRATE
CAMERA
INTERNET
READ_CONTACTS
READ_PHONE_STATE
ACCESS_FINE_LOCATION
Main Activity
my.app.client.LauncherActivity
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118700
Highest datetime
2015-06-07 20:25:26
Lowest datetime
2015-06-07 20:25:26
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 ca08cc8d730015226b0d1f0f8cfb41da
SHA1 51d5de747a83f2ffe1ad0d8f1589bfb768cebeed
SHA256 2c2d6caf2801070fef2e5cdacd215e2fad78713d06a307a4b92bc894012e1ad2
ssdeep
1536:+3HGMkjfKWKINpw8nMt2nM0yQgWkpDT2jUey69VF80:imMkjfXK8pw4Mt2r5qpejb720

File size 67.0 KB ( 68651 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-06-07 18:30:13 UTC ( 2 years, 2 months ago )
Last submission 2015-06-07 18:30:13 UTC ( 2 years, 2 months ago )
File names Lol.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end