× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 48a8f4ceadeb47fb9a440d6ea1a18828bd9edb94432dba1f10c67b4d1e5a7203
File name: Framework.apk
Detection ratio: 23 / 57
Analysis date: 2015-05-22 11:49:00 UTC ( 2 years, 3 months ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20150522
AegisLab SUSPICIOUS 20150522
AhnLab-V3 Android-Spyware/Androrat.2f84 20150522
Alibaba A.L.Rog.Androrat 20150522
Avast Android:Androrat-I [Trj] 20150522
AVG Android/SpyAgent 20150522
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20150522
BitDefender Android.Riskware.AndroRat.A 20150522
CAT-QuickHeal Android.Climap.A (Suspicious) 20150522
ClamAV Andr.Trojan.Androrat 20150522
Cyren AndroidOS/AndroRat.A.gen!Eldorado 20150522
DrWeb Program.Androrat.1.origin 20150522
ESET-NOD32 a variant of Android/Spy.AndroRAT.D 20150522
F-Secure Monitoring-Tool:Android/AndroRat.B 20150522
Fortinet Android/AndroRat.A!tr 20150522
GData Android.Riskware.AndroRat.A 20150522
Ikarus Trojan-Spy.AndroidOS.Androrat 20150522
K7GW Spyware ( 004c0e381 ) 20150522
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20150522
Microsoft MonitoringTool:AndroidOS/AndroRat 20150522
eScan Android.Riskware.AndroRat.A 20150522
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20150522
Sophos AV Andr/AndroRat-C 20150522
Yandex 20150521
ALYac 20150522
Antiy-AVL 20150522
AVware 20150522
Baidu-International 20150522
Bkav 20150522
ByteHero 20150522
CMC 20150520
Comodo 20150522
Emsisoft 20150522
F-Prot 20150522
Jiangmin 20150519
K7AntiVirus 20150522
Kingsoft 20150522
Malwarebytes 20150522
McAfee 20150522
McAfee-GW-Edition 20150522
Norman 20150522
nProtect 20150522
Panda 20150522
Qihoo-360 20150522
Rising 20150522
SUPERAntiSpyware 20150522
Symantec 20150522
Tencent 20150522
TheHacker 20150521
TotalDefense 20150522
TrendMicro 20150522
TrendMicro-HouseCall 20150522
VBA32 20150522
VIPRE 20150522
ViRobot 20150522
Zillya 20150521
Zoner 20150521
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Risk summary
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECORD_AUDIO (record audio)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Permission-related API calls
ACCESS_NETWORK_STATE
RECORD_AUDIO
SEND_SMS
VIBRATE
CAMERA
INTERNET
READ_CONTACTS
READ_PHONE_STATE
ACCESS_FINE_LOCATION
Main Activity
my.app.client.LauncherActivity
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
Application bundle files
File identification
MD5 973effd1ebab8c3c73ab37184785d9c0
SHA1 0d2380c40d4a851dc0c12c01b61ff0ba0e274e2b
SHA256 48a8f4ceadeb47fb9a440d6ea1a18828bd9edb94432dba1f10c67b4d1e5a7203
ssdeep
1536:23HDMfjfKWKIsMC+Tyo6zN2wgTUMs+l3RUkzzGjq:qjMfjfXKVMKxN2zTNsu3d+m

File size 67.0 KB ( 68652 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-05-22 11:49:00 UTC ( 2 years, 3 months ago )
Last submission 2015-05-22 11:49:00 UTC ( 2 years, 3 months ago )
File names Framework.apk
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0xaa0ea0a3

FileType
ZIP

ZipCompression
Deflated

ZipUncompressedSize
756

ZipCompressedSize
404

FileTypeExtension
zip

ZipFileName
META-INF/MANIFEST.MF

ZipBitFlag
0x0808

ZipModifyDate
2015:05:22 14:45:01

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!