× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2ef49d2ba03c8d9420e008edb8d04fb3abad2fd41684e65d0d47ef5fc4d2787a
File name: da7fffa08bdeb945ca8237c2894aedd0.apk
Detection ratio: 32 / 58
Analysis date: 2016-03-26 19:49:04 UTC ( 1 year, 3 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.FakeInst.HE 20160326
AhnLab-V3 Android-Trojan/FakeInst.4dc7 20160326
Alibaba A.W.Rog.EvilCert.AC 20160323
Antiy-AVL Trojan[SMS]/AndroidOS.Agent.dr 20160326
Arcabit Android.Trojan.FakeInst.HE 20160326
Avast Android:Agent-BDX [Trj] 20160326
AVG Android/SMSAgent.U 20160326
Avira (no cloud) ANDROID/TrojanSMS.Agent.SD.Gen 20160326
AVware Trojan.AndroidOS.Generic.A 20160326
Baidu-International Trojan.Android.Agent.SD 20160326
BitDefender Android.Trojan.FakeInst.HE 20160326
CAT-QuickHeal Android.FakeInst.BH 20160326
Comodo UnclassifiedMalware 20160326
Cyren AndroidOS/GenBl.DA7FFFA0!Olympus 20160326
DrWeb Android.SmsSend.809.origin 20160326
Emsisoft Android.Trojan.FakeInst.HE (B) 20160326
ESET-NOD32 a variant of Android/TrojanSMS.Agent.SD 20160326
F-Secure Trojan:Android/Fakeinst.FU 20160326
Fortinet Android/Agent.SD!tr 20160326
GData Android.Trojan.FakeInst.HE 20160326
Ikarus Trojan-SMS.AndroidOS.Agent 20160326
K7GW Trojan ( 0048d9c51 ) 20160323
Kaspersky HEUR:Trojan-SMS.AndroidOS.Agent.dr 20160326
Kingsoft Android.Troj.at_FakeFlashPlayer.c.(kcloud) 20160326
McAfee Artemis!DA7FFFA08BDE 20160326
eScan Android.Trojan.FakeInst.HE 20160326
NANO-Antivirus Trojan.Android.Agent.cudlui 20160326
Qihoo-360 Trojan.Android.Gen 20160326
Sophos Andr/RuSms-AL 20160326
Symantec Android.Premiumtext 20160326
Tencent Trojan.Android.Agent.97857E44 20160326
VIPRE Trojan.AndroidOS.Generic.A 20160326
AegisLab 20160326
Yandex 20160316
ALYac 20160326
Baidu 20160325
Bkav 20160326
ByteHero 20160326
ClamAV 20160326
CMC 20160322
F-Prot 20160326
Jiangmin 20160326
K7AntiVirus 20160326
Malwarebytes 20160326
McAfee-GW-Edition 20160326
Microsoft 20160326
nProtect 20160325
Panda 20160326
Rising 20160326
SUPERAntiSpyware 20160326
TheHacker 20160325
TotalDefense 20160326
TrendMicro 20160326
TrendMicro-HouseCall 20160326
VBA32 20160325
ViRobot 20160326
Zillya 20160326
Zoner 20160326
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.example.service_update_v3. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 10.
Required permissions
android.permission.BATTERY_STATS (modify battery statistics)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.SEND_SMS (send SMS messages)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.SIM_STATE_READY (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Activities
com.example.service_update_v3.Service_updateActivity
com.example.service_update_v3.install
Services
com.example.service_update_v3.MyService
Receivers
com.example.service_update_v3.SmsReceiver
com.example.service_update_v3.BootUpReceiver
Activity-related intent filters
com.example.service_update_v3.Service_updateActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.example.service_update_v3.BootUpReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.DEFAULT
com.example.service_update_v3.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
16
Uncompressed size
245370
Highest datetime
2013-11-12 18:19:22
Lowest datetime
2013-11-12 17:37:04
Contained files by extension
png
9
xml
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
9
unknown
4
XML
2
DEX
1
File identification
MD5 da7fffa08bdeb945ca8237c2894aedd0
SHA1 ad25fb4e04cdd05bbf602aea877cc386a051429c
SHA256 2ef49d2ba03c8d9420e008edb8d04fb3abad2fd41684e65d0d47ef5fc4d2787a
ssdeep
1536:xONTdrEKRF6zoXXYcTuyJzjkW3UXwpaRGzOuuwMuOREFyU0NdABLgTJLMa72F/5X:tzof3wwtu4UwyncRglLMfx5v/LaQ

File size 130.6 KB ( 133716 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2013-11-12 18:04:42 UTC ( 3 years, 7 months ago )
Last submission 2015-03-03 03:21:05 UTC ( 2 years, 3 months ago )
File names service_update.apk
vti-rescan
2ef49d2ba03c8d9420e008edb8d04fb3abad2fd41684e65d0d47ef5fc4d2787a
da7fffa08bdeb945ca8237c2894aedd0.apk
da7fffa08bdeb945ca8237c2894aedd0_INF128E.tmp
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.example.service_update_v3/.MyService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.