× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2fefdf10db683251b62aec396cfa139c0cf7c1c6eebee805cda59bd1b53c177f
File name: Photo Editor.apk
Detection ratio: 33 / 55
Analysis date: 2016-01-11 15:31:30 UTC ( 1 year, 7 months ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20160111
AegisLab Androrat_1 20160111
AhnLab-V3 Android-Spyware/Androrat.2f84 20160111
Alibaba A.L.Rog.Androrat 20160111
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Climap.1 20160111
Avast Android:Androrat-I [Trj] 20160111
AVG Android/SpyAgent 20160111
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20160111
AVware Trojan.AndroidOS.Generic.A 20160111
Baidu-International Trojan.Android.AndroRAT.D 20160111
BitDefender Android.Riskware.AndroRat.A 20160111
CAT-QuickHeal Android.AndroRAT.A (PUP) 20160111
ClamAV Andr.Trojan.Androrat 20160110
Cyren AndroidOS/AndroRAT.A 20160111
DrWeb Program.Androrat.1.origin 20160111
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20160111
F-Prot AndroidOS/AndroRAT.A 20160111
F-Secure Monitoring-Tool:Android/AndroRat.B 20160111
Fortinet Android/AndroRat.A!tr 20160111
GData Android.Riskware.AndroRat.A 20160111
Ikarus Trojan-Spy.AndroidOS.Androrat 20160111
K7GW Trojan ( 0048d4dc1 ) 20160111
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20160111
McAfee Artemis!996E356CD5FB 20160111
McAfee-GW-Edition Artemis!PUP 20160111
Microsoft MonitoringTool:AndroidOS/AndroRat 20160111
eScan Android.Riskware.AndroRat.A 20160111
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20160111
Qihoo-360 Trojan.Android.Gen 20160111
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160111
Sophos AV Andr/AndroRat-C 20160111
VIPRE Trojan.AndroidOS.Generic.A 20160111
Zoner Trojan.AndroidOS.AndroRat.A 20160111
Yandex 20160111
ALYac 20160111
Arcabit 20160111
Bkav 20160111
ByteHero 20160111
CMC 20160111
Comodo 20160111
Emsisoft 20160111
Jiangmin 20160111
K7AntiVirus 20160111
Malwarebytes 20160111
nProtect 20160111
Panda 20160111
SUPERAntiSpyware 20160111
Symantec 20160111
TheHacker 20160107
TotalDefense 20160111
TrendMicro 20160111
TrendMicro-HouseCall 20160111
VBA32 20160111
ViRobot 20160111
Zillya 20160111
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Risk summary
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.RECORD_AUDIO (record audio)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECEIVE_SMS (receive SMS)
Permission-related API calls
ACCESS_NETWORK_STATE
RECORD_AUDIO
SEND_SMS
VIBRATE
CAMERA
INTERNET
READ_CONTACTS
READ_PHONE_STATE
ACCESS_FINE_LOCATION
Main Activity
my.app.client.LauncherActivity
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118712
Highest datetime
2015-06-05 19:11:42
Lowest datetime
2015-06-05 19:11:40
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 996e356cd5fb9acbd4eafd326f6ecbbc
SHA1 b5bd3ff9d5ae272179662d6b47f13bfbbfdbf2d5
SHA256 2fefdf10db683251b62aec396cfa139c0cf7c1c6eebee805cda59bd1b53c177f
ssdeep
1536:903HlMwjfKWKIG32/PmpyAf0DFixrS41WgfR:94FMwjfXKXMmMDo/4gR

File size 67.0 KB ( 68653 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-06-05 17:15:15 UTC ( 2 years, 2 months ago )
Last submission 2015-06-05 17:15:15 UTC ( 2 years, 2 months ago )
File names Photo Editor.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end