× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 80b020e2df1a266f2500edee837a2287ed42dd7987aeed76bef5535a52cc0263
File name: M141.apk
Detection ratio: 35 / 56
Analysis date: 2015-07-20 06:10:06 UTC ( 1 month, 1 week ago )
Antivirus Result Update
AVG Android/Deng.C 20150720
AVware Trojan.AndroidOS.Generic.A 20150720
Ad-Aware Android.Trojan.Pincer.A 20150720
AegisLab Pincer 20150719
AhnLab-V3 Android-Trojan/Diver.2afd 20150720
Alibaba A.H.Pri.Pincer 20150720
Antiy-AVL Trojan[Backdoor]/AndroidOS.Pincer.a 20150720
Arcabit Android.Trojan.Pincer.A 20150720
Avast Android:SecCert-D [Trj] 20150720
Avira ANDROID/SecCert.A.2 20150719
Baidu-International Trojan.Android.SecCert.A 20150719
BitDefender Android.Trojan.Pincer.A 20150720
CAT-QuickHeal Android.Pincer.A 20150717
ClamAV Andr.Trojan.Pincer 20150717
Comodo UnclassifiedMalware 20150720
Cyren AndroidOS/AndSpy.A.gen!Eldorado 20150720
DrWeb Android.Pincer.1.origin 20150720
ESET-NOD32 Android/SecCert.A 20150720
Emsisoft Android.Trojan.Pincer.A (B) 20150720
F-Secure Trojan:Android/Pincer.A 20150720
Fortinet Android/Pincer.A!tr.spy 20150720
GData Android.Trojan.Pincer.A 20150720
Ikarus AndroidOS.SecCert.A 20150720
K7AntiVirus Trojan ( 0001140e1 ) 20150719
K7GW Trojan ( 0001140e1 ) 20150720
Kaspersky HEUR:Backdoor.AndroidOS.Pincer.a 20150720
Kingsoft Android.Troj.at_Pincer.a.(kcloud) 20150720
McAfee Artemis!F9CBEE9D395A 20150720
MicroWorld-eScan Android.Trojan.Pincer.A 20150720
NANO-Antivirus Trojan.Android.Pincer.dqcaln 20150720
Qihoo-360 Trojan.Generic 20150720
Sophos Andr/Pincer-A 20150720
Symantec Trojan.Gen.2 20150720
Tencent a.privacy.pincer 20150720
VIPRE Trojan.AndroidOS.Generic.A 20150720
ALYac 20150720
Agnitum 20150717
Bkav 20150720
ByteHero 20150720
F-Prot 20150720
Jiangmin 20150719
Malwarebytes 20150720
McAfee-GW-Edition 20150719
Microsoft 20150720
Panda 20150719
Rising 20150718
SUPERAntiSpyware 20150720
TheHacker 20150717
TotalDefense 20150719
TrendMicro 20150720
TrendMicro-HouseCall 20150720
VBA32 20150718
ViRobot 20150720
Zillya 20150719
Zoner 20150720
nProtect 20150717
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.senneco.diverter. The internal version number of the application is 4. The displayed version string of the application is 4.6. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Risk summary
The studied DEX file makes use of API reflection
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_LOGS (read sensitive log data)
android.permission.CALL_PRIVILEGED (directly call any phone numbers)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.MODIFY_PHONE_STATE (modify phone status)
Permission-related API calls
CHANGE_COMPONENT_ENABLED_STATE
READ_PHONE_STATE
SEND_SMS
INTERNET
READ_LOGS
Main Activity
com.senneco.diverter.ui.MainActivity
Activities
com.senneco.diverter.ui.MainActivity
com.senneco.diverter.ui.UssdActivity
com.senneco.diverter.ui.MessageDialogActivity
Services
com.senneco.diverter.services.CheckCommandsService
com.senneco.diverter.services.CheckQueueService
com.senneco.diverter.services.USSDDumbExtendedNetworkService
Receivers
com.senneco.diverter.services.ReCheckCommandReceiver
com.senneco.diverter.services.ReSendQueueReceiver
com.senneco.diverter.services.SmsSentReceiver
com.senneco.diverter.services.SmsReceiver
com.senneco.diverter.services.PhoneCallReceiver
com.senneco.diverter.services.OnBootReceiver
Service-related intent filters
com.senneco.diverter.services.USSDDumbExtendedNetworkService
actions: com.android.ussd.IExtendedNetworkService
categories: android.intent.category.DEFAULT
Activity-related intent filters
com.senneco.diverter.ui.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.senneco.diverter.services.ReSendQueueReceiver
actions: android.intent.action.RE_SEND_QUEUE
com.senneco.diverter.services.SmsSentReceiver
actions: android.intent.action.SMS_SENT
com.senneco.diverter.services.OnBootReceiver
actions: android.intent.action.BOOT_COMPLETED
com.senneco.diverter.services.ReCheckCommandReceiver
actions: android.intent.action.RE_CHECK_COMMAND
com.senneco.diverter.services.PhoneCallReceiver
actions: android.intent.action.PHONE_STATE
com.senneco.diverter.services.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
Code-related observations
The application does not load any code dynamically
The application contains reflection code
The application does not contain native code
The application does not contain cryptographic code
Application certificate information
Application bundle files
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
18
Uncompressed size
145560
Highest datetime
2013-02-22 21:37:12
Lowest datetime
2013-02-21 02:53:30
Contained files by extension
png
8
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
8
unknown
6
XML
3
DEX
1
File identification
MD5 f9cbee9d395ae6e044298c75919f10fb
SHA1 60e1cd1191e0553f8d02289b96804e4ab48953b3
SHA256 80b020e2df1a266f2500edee837a2287ed42dd7987aeed76bef5535a52cc0263
ssdeep
1536:t/nRPDX5i6T3kJYuZDx9nfCGR9M2Y4qFzyJNQUaCAmEHc0:t/RPDX5i6roYuZlc29TY4q5yJ+UaCAms

File size 81.0 KB ( 82972 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android ext-prg

VirusTotal metadata
First submission 2013-03-19 20:07:00 UTC ( 2 years, 5 months ago )
Last submission 2015-07-20 06:10:06 UTC ( 1 month, 1 week ago )
File names 1403189705.24.log
Recent29-c.apk
N106.apk
80b020e2df1a266f2500edee837a2287ed42dd7987aeed76bef5535a52cc0263
f9cbee9d395ae6e044298c75919f10fb_1.apk
Recent29-c.apk
80B020E2DF1A266F2500EDEE837A2287ED42DD7987AEED76BEF5535A52CC0263.APK.log
N106.apk
vti-rescan
f9cbee9d395ae6e044298c75919f10fb.60e1cd1191e0553f8d02289b96804e4ab48953b3
J150.apk
M141.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.senneco.diverter/.services.CheckCommandsService;end
#Intent;component=com.senneco.diverter/.services.CheckQueueService;end
External programs launched
logcat -d USSDDumbExtendedNetworkService:I *:S
Accessed files
/system/app/Superuser.apk
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.