× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3a25e00bc0ce814ea59fca65ed0aa616ff6e75332503c09568e6599d818fbbc1
File name: F869165C110C39F2681BC91BCEF04CD5.apk
Detection ratio: 36 / 61
Analysis date: 2018-01-25 18:39:09 UTC ( 7 months, 3 weeks ago )
Antivirus Result Update
AegisLab SUSPICIOUS 20180125
AhnLab-V3 Android-Trojan/Slocker.e425 20180125
Alibaba A.H.Pri.PoPlayer 20180125
Antiy-AVL Trojan[Ransom]/Android.Fusob 20180125
Arcabit Android.Trojan.SLocker.CV 20180125
Avast Android:Locker-CG [Trj] 20180125
Avast-Mobile Android:Locker-DB [Trj] 20180125
AVG Android:Locker-CG [Trj] 20180125
Avira (no cloud) ANDROID/Agent.CS.Gen 20180125
AVware Trojan.AndroidOS.Generic.A 20180124
Baidu Android.Trojan.Locker.aw 20180124
BitDefender Android.Trojan.SLocker.CV 20180125
CAT-QuickHeal Android.Simplocker.K 20180125
Cyren AndroidOS/SLocker.P 20180125
DrWeb Android.Locker.89.origin 20180125
Emsisoft Android.Trojan.SLocker.CV (B) 20180125
ESET-NOD32 a variant of Android/Locker.AL 20180125
F-Prot AndroidOS/SLocker.P 20180125
GData Android.Trojan.SLocker.CV 20180125
Ikarus Trojan-Ransom.AndroidOS.PornLocker 20180125
K7GW Trojan ( 000027101 ) 20180125
Kaspersky HEUR:Trojan-Ransom.AndroidOS.Fusob.a 20180125
MAX malware (ai score=81) 20180125
McAfee Artemis!F869165C110C 20180125
McAfee-GW-Edition Artemis!Trojan 20180125
eScan Android.Trojan.SLocker.CV 20180125
NANO-Antivirus Trojan.Android.Ransom.dpajzg 20180125
Qihoo-360 Trojan.Android.Gen 20180125
Sophos AV Andr/PornLock-D 20180125
Symantec Trojan.Gen.2 20180125
Symantec Mobile Insight Trojan:Lockdroid.E 20180125
Tencent Trojan.Android.Fusob.kkc 20180125
Trustlook Android.Malware.Trojan 20180125
Zillya Trojan.Fusob.Android.24 20180125
ZoneAlarm by Check Point HEUR:Trojan-Ransom.AndroidOS.Fusob.a 20180125
Zoner Trojan.AndroidOS.SIMLocker.B 20180125
Ad-Aware 20180125
ALYac 20180125
Bkav 20180125
ClamAV 20180125
CMC 20180125
Comodo 20180125
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180125
eGambit 20180125
Endgame 20171130
Fortinet 20180125
Sophos ML 20180121
Jiangmin 20180125
K7AntiVirus 20180125
Kingsoft 20180125
Malwarebytes 20180125
Microsoft 20180125
nProtect 20180125
Palo Alto Networks (Known Signatures) 20180125
Panda 20180125
Rising 20180125
SentinelOne (Static ML) 20180115
SUPERAntiSpyware 20180125
TheHacker 20180125
TotalDefense 20180125
TrendMicro 20180125
TrendMicro-HouseCall 20180125
VBA32 20180125
VIPRE 20180125
ViRobot 20180125
Webroot 20180125
Yandex 20180112
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.vigils. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.WRITE_CONTACTS (write contact data)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
android.permission.ACCESS_COARSE_UPDATES (Unknown permission from android reference)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.CAMERA (take pictures and videos)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_PROFILE (read the user's personal profile data)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
Activities
com.vigils.MainActivity
com.vigils.RestructuringActivity
com.vigils.UnsafelyActivity
com.vigils.SurpassActivity
com.vigils.TremblesActivity
Services
com.vigils.VisuallyService
com.vigils.abcMainService5
Receivers
com.vigils.abcMainReceiver4
com.vigils.Slimmers
Activity-related intent filters
com.vigils.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.vigils.Slimmers
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.vigils.abcMainReceiver4
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, android.intent.action.SCREEN_ON, android.intent.action.NEW_OUTGOING_CALL, android.intent.action.PHONE_STATE
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
9
Uncompressed size
72132
Highest datetime
2015-03-05 18:29:56
Lowest datetime
2015-03-05 18:29:54
Contained files by extension
xml
3
dex
1
MF
1
RSA
1
SF
1
png
1
Contained files by type
unknown
4
XML
3
DEX
1
PNG
1
File identification
MD5 f869165c110c39f2681bc91bcef04cd5
SHA1 2b0cd6ce0150bced6fb05211850c91e0aa0ca2a9
SHA256 3a25e00bc0ce814ea59fca65ed0aa616ff6e75332503c09568e6599d818fbbc1
ssdeep
768:/EOFKBYulSKRhF/XRL7OLydrOLnB9NU98BQ8hJ6vXdBgeu:/EOFKdSKRjXRHYygLn298BQ8H6vX3gB

File size 35.4 KB ( 36287 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android

VirusTotal metadata
First submission 2015-03-13 11:46:41 UTC ( 3 years, 6 months ago )
Last submission 2018-01-25 18:39:09 UTC ( 7 months, 3 weeks ago )
File names F869165C110C39F2681BC91BCEF04CD5.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started activities
#Intent;launchFlags=0x30000000;component=com.vigils/.UnsafelyActivity;end
Started services
#Intent;component=com.vigils/.abcMainService5;end
#Intent;action=android.intent.action.BOOT_COMPLETED;component=com.vigils/.abcMainService5;end
Started receivers
android.intent.action.SCREEN_ON
android.intent.action.SCREEN_OFF
Opened files
/mnt/sdcard/Download
Accessed files
/data/data/com.vigils/files
/data/data/com.vigils/files/slicks.jpg
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://ordersprocessingengine.com
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
http://logmydog.com
7265706F72743D657949784F534936496A4578496977694D5463694F694A7159585A684C6D7868626D63755258686A5A584230615739754F69426A59573078496977694D5467694F694A7159585A684C6D7868626D63755258686A5A584230615739754F69426A59573078584735636447463049474E76625335326157647062484D755A4335684B465675613235766432346755323931636D4E6C4B567875584852686443426A62323075646D6C6E6157787A4C6D4975614746755A47786C5457567A6332466E5A536856626D74756233647549464E7664584A6A5A536C63626C7830595851675957356B636D39705A433576637935495957356B624756794C...