× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 901979e1d02c9a355fbe80a6a863e6c7684d0e15ec458935e67b1418a00e43d8
File name: StrikeMessage.StrikeMessage.apk
Detection ratio: 36 / 62
Analysis date: 2018-09-21 11:16:45 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware Android.Trojan.Aulrin.A 20180921
AegisLab Trojan.AndroidOS.Generic.m!c 20180921
AhnLab-V3 Android-Trojan/Aulrin.be36 20180921
Antiy-AVL Trojan[Backdoor]/Android.Aulrin 20180921
Arcabit Android.Trojan.Aulrin.A 20180921
Avast Android:Aulurin-B [Trj] 20180921
Avast-Mobile Android:Aulurin-B [Trj] 20180921
AVG Android:Aulurin-B [Trj] 20180921
Avira (no cloud) ANDROID/Aulrin.A.Gen 20180921
Babable Malware.HighConfidence 20180918
Baidu Android.Backdoor.Aulrin.a 20180914
BitDefender Android.Trojan.Aulrin.A 20180921
CAT-QuickHeal Android.Aulrin.A 20180918
Cyren AndroidOS/GenBl.03FA8FAE!Olympus 20180921
DrWeb Android.BankBot.6 20180921
Emsisoft Android.Trojan.Aulrin.A (B) 20180921
ESET-NOD32 a variant of Android/Aulrin.A 20180921
F-Secure Trojan:Android/SmsSend.VW 20180921
Fortinet Android/Aulrin.A 20180921
GData Android.Trojan.Aulrin.A 20180921
Ikarus Trojan.AndroidOS.Aulrin 20180921
K7GW Trojan ( 004b06f91 ) 20180921
Kaspersky HEUR:Backdoor.AndroidOS.Aulrin.a 20180921
MAX malware (ai score=88) 20180921
McAfee Artemis!03FA8FAE3C54 20180921
McAfee-GW-Edition Artemis 20180921
eScan Android.Trojan.Aulrin.A 20180921
NANO-Antivirus Trojan.Android.Aulrin.djyacb 20180921
Qihoo-360 Trojan.Android.Gen 20180921
Sophos AV Andr/Aulrin-A 20180921
Symantec Trojan.Gen.2 20180921
Symantec Mobile Insight Trojan:Genheur 20180918
Tencent Trojan.Android.Aulrin.a 20180921
Trustlook Android.Malware.Trojan 20180921
ZoneAlarm by Check Point HEUR:Backdoor.AndroidOS.Aulrin.a 20180921
Zoner Trojan.AndroidOS.SmsSend.B 20180920
Alibaba 20180912
ALYac 20180921
AVware 20180921
Bkav 20180921
ClamAV 20180921
CMC 20180921
Comodo 20180921
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180921
eGambit 20180921
Endgame 20180730
F-Prot 20180921
Sophos ML 20180717
Jiangmin 20180921
K7AntiVirus 20180921
Kingsoft 20180921
Malwarebytes 20180921
Microsoft 20180921
Palo Alto Networks (Known Signatures) 20180921
Panda 20180920
Rising 20180921
SentinelOne (Static ML) 20180830
SUPERAntiSpyware 20180907
TACHYON 20180921
TheHacker 20180920
TotalDefense 20180920
TrendMicro 20180921
TrendMicro-HouseCall 20180921
VBA32 20180921
VIPRE 20180921
ViRobot 20180921
Webroot 20180921
Yandex 20180920
Zillya 20180920
The file being studied is Android related! APK Android file more specifically. The application's main package name is StrikeMessage.StrikeMessage. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 10.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CONTROL_LOCATION_UPDATES (control location update notifications)
android.permission.ACCESS_MOCK_LOCATION (mock location sources for testing)
android.permission.CHANGE_COMPONENT_ENABLED_STATE (enable or disable application components)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.MODIFY_PHONE_STATE (modify phone status)
android.permission.READ_SMS (read SMS or MMS)
Activities
z.core.MainActivity
xamarin.media.MediaPickerActivity
Services
z.core.RunService
Receivers
z.core.OnBootHandler
z.core.SMSReciever
StrikeMessage.StrikeMessage.SMSReceiver
Providers
mono.MonoRuntimeProvider
Activity-related intent filters
z.core.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters

actions: android.intent.action.BOOT_COMPLETED
z.core.OnBootHandler
actions: android.intent.action.BOOT_COMPLETED
StrikeMessage.StrikeMessage.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
12
Uncompressed size
4490644
Highest datetime
2014-11-06 23:17:16
Lowest datetime
2014-11-04 01:05:56
Contained files by extension
so
3
xml
2
dex
1
MF
1
RSA
1
SF
1
png
1
Contained files by type
unknown
5
ELF
3
XML
2
DEX
1
PNG
1
File identification
MD5 03fa8fae3c54989cacc1426b5716eb07
SHA1 b1eaa55a7402fdcbd6c46e80c066a1400ce6cdc3
SHA256 901979e1d02c9a355fbe80a6a863e6c7684d0e15ec458935e67b1418a00e43d8
ssdeep
49152:wnGv/Tb9o96szC15X9Y6RHl9nsuyAheAM4rqUhDPqjpejXYeTtij3sg7N6L:XvrbPtX66RF99BM4bPqjptjsgJa

File size 2.5 MB ( 2595198 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2014-11-06 20:20:48 UTC ( 4 years, 1 month ago )
Last submission 2015-04-02 11:53:51 UTC ( 3 years, 8 months ago )
File names StrikeMessage.StrikeMessage-Signed.apk
vti-rescan
StrikeMessage.StrikeMessage.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/StrikeMessage.StrikeMessage/files
/data/data/StrikeMessage.StrikeMessage/cache
/mnt/sdcard/Android/data/StrikeMessage.StrikeMessage/files/.__override__
Accessed files
/data/data/StrikeMessage.StrikeMessage/files