× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6b3aedb909d4d12bb4073fec15af5e2d1a1fca2a67775dce4de2d77826eac608
File name: xxx.apk
Detection ratio: 32 / 60
Analysis date: 2018-05-14 00:02:04 UTC ( 8 months, 1 week ago )
Antivirus Result Update
AegisLab Android.Troj.Hiddenapp!c 20180513
AhnLab-V3 Android-Trojan/Marcher.f767 20180513
Alibaba A.L.Rog.Banker.G 20180511
Antiy-AVL Trojan/Android.TSGeneric 20180513
Arcabit Android.Trojan.Marcher.S 20180514
Avast Android:Banker-PM [Trj] 20180514
Avast-Mobile Android:Banker-VB [Trj] 20180513
AVG Android:Banker-PM [Trj] 20180514
Avira (no cloud) ANDROID/Spy.Banker.HG.Gen 20180513
Babable Malware.HighConfidence 20180406
BitDefender Android.Trojan.Marcher.S 20180513
CAT-QuickHeal Android.Marcher.E 20180513
Cyren AndroidOS/GenBl.D332560F!Olympus 20180514
Emsisoft Android.Trojan.Marcher.S (B) 20180513
ESET-NOD32 a variant of Android/Spy.Banker.HG 20180513
Fortinet Android/Generic.Z.2EC609!tr 20180514
GData Android.Trojan.Marcher.S 20180513
K7GW Trojan ( 000027101 ) 20180513
Kaspersky HEUR:Trojan-Banker.AndroidOS.Smaps.a 20180513
MAX malware (ai score=85) 20180514
McAfee Artemis!D332560F1FC3 20180513
McAfee-GW-Edition Artemis!Trojan 20180513
NANO-Antivirus Trojan.Android.BankBot.ekfoec 20180513
Qihoo-360 Trojan.Android.Gen 20180514
Rising Spyware.Banker/Android!8.45C (CLOUD) 20180513
Sophos AV Andr/Banker-GPH 20180513
Symantec Trojan.Gen.2 20180513
Symantec Mobile Insight Trojan:Fakebank.B 20180511
Tencent a.privacy.spiderbank 20180514
Trustlook Android.Malware.Trojan 20180514
Zillya Trojan.Banker.Android.2902 20180511
ZoneAlarm by Check Point HEUR:Trojan-Banker.AndroidOS.Smaps.a 20180513
Ad-Aware 20180513
ALYac 20180514
AVware 20180428
Baidu 20180511
Bkav 20180511
ClamAV 20180513
CMC 20180513
Comodo 20180513
CrowdStrike Falcon (ML) 20180418
Cybereason None
Cylance 20180514
eGambit 20180514
Endgame 20180507
F-Prot 20180514
F-Secure 20180514
Sophos ML 20180503
Jiangmin 20180513
K7AntiVirus 20180513
Kingsoft 20180514
Malwarebytes 20180513
Microsoft 20180513
eScan 20180513
nProtect 20180513
Palo Alto Networks (Known Signatures) 20180514
Panda 20180513
SentinelOne (Static ML) 20180225
SUPERAntiSpyware 20180513
TheHacker 20180509
TotalDefense 20180513
TrendMicro-HouseCall 20180513
VBA32 20180511
VIPRE 20180513
ViRobot 20180513
Webroot 20180514
Yandex 20180513
Zoner 20180513
The file being studied is Android related! APK Android file more specifically. The application's main package name is uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.SEND_SMS (send SMS messages)
android.permission.USES_POLICY_FORCE_LOCK (Unknown permission from android reference)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.READ_SMS (read SMS or MMS)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECEIVE_SMS (receive SMS)
Activities
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p027c
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p019a
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p081m
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p054m
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p024t
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p015i
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p015j
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p065g
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p089d
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p034h
Services
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p050b
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078p
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p074f
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p080g
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p047p
Receivers
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p025w
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p059f
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p015t
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078d
Service-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p050b
actions: com.android.ussd.IExtendedNetworkService
Activity-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p027c
actions: android.intent.action.MAIN
categories: android.intent.category.DEFAULT, android.intent.category.LAUNCHER
Receiver-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p025w
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p059f
actions: android.provider.Telephony.SMS_RECEIVED
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078d
actions: p027c.AlarmAction
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p015t
actions: android.app.action.DEVICE_ADMIN_ENABLED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
310
Uncompressed size
1168372
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
204
xml
101
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
204
XML
101
unknown
4
DEX
1
File identification
MD5 d332560f1fc3e6dc58d94d6fa0dab748
SHA1 5b5da8f6fd696d540106ed90ef95acea4c8b4dc9
SHA256 6b3aedb909d4d12bb4073fec15af5e2d1a1fca2a67775dce4de2d77826eac608
ssdeep
12288:MuXAtH9buEMr1zRdUJHWD7XUaBIvjt841dyY79PT0mW:Meolmby2D7UaBIvjH1dyY79PT0mW

File size 685.6 KB ( 702099 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-01-03 00:29:34 UTC ( 2 years ago )
Last submission 2018-05-14 00:02:04 UTC ( 8 months, 1 week ago )
File names d332560f1fc3e6dc58d94d6fa0dab748.apk
SuperMarioRun.apk
xxx.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!