× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9bc9e363a134a7617ff2a4908c5d3572729d1be3ba48c7755e00ad97ae443212
File name: 9159868B184908427BAF18D42D806CB5
Detection ratio: 33 / 55
Analysis date: 2016-01-19 09:04:09 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20160119
AegisLab Climap 20160119
AhnLab-V3 Android-Spyware/Androrat.2f84 20160119
Alibaba A.L.Rog.Androrat 20160119
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Climap.1 20160119
Arcabit Android.Riskware.AndroRat.A 20160119
Avast Android:Androrat-I [Trj] 20160119
AVG Android/SpyAgent 20160119
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20160119
AVware Trojan.AndroidOS.Generic.A 20160111
Baidu-International Trojan.Android.AndroRAT.D 20160119
BitDefender Android.Riskware.AndroRat.A 20160119
CAT-QuickHeal Android.AndroRAT.A (PUP) 20160119
ClamAV Andr.Trojan.Androrat 20160119
Cyren AndroidOS/AndroRat.A.gen!Eldorado 20160119
DrWeb Program.Androrat.1.origin 20160119
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20160119
F-Secure Monitoring-Tool:Android/AndroRat.B 20160119
Fortinet Android/AndroRat.A!tr 20160119
GData Android.Riskware.AndroRat.A 20160119
Ikarus Trojan-Spy.AndroidOS.Androrat 20160119
K7GW Trojan ( 0048d4dc1 ) 20160119
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20160119
McAfee Artemis!9159868B1849 20160119
McAfee-GW-Edition Artemis!PUP 20160119
Microsoft MonitoringTool:AndroidOS/AndroRat 20160119
eScan Android.Riskware.AndroRat.A 20160119
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20160119
Qihoo-360 Trojan.Android.Gen 20160119
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160119
Sophos AV Andr/AndroRat-C 20160119
VIPRE Trojan.AndroidOS.Generic.A 20160119
Zoner Trojan.AndroidOS.AndroRat.A 20160119
Yandex 20160118
ALYac 20160119
Bkav 20160118
ByteHero 20160119
CMC 20160111
Comodo 20160119
Emsisoft 20160119
F-Prot 20160119
Jiangmin 20160119
K7AntiVirus 20160119
Malwarebytes 20160119
nProtect 20160119
Panda 20160118
SUPERAntiSpyware 20160119
Symantec 20160118
TheHacker 20160119
TotalDefense 20160119
TrendMicro 20160119
TrendMicro-HouseCall 20160119
VBA32 20160117
ViRobot 20160119
Zillya 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECORD_AUDIO (record audio)
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118708
Highest datetime
2015-07-15 01:41:48
Lowest datetime
2015-07-15 01:41:48
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 9159868b184908427baf18d42d806cb5
SHA1 d23883ca48aa17f8a7faa5a39b1357efb585962b
SHA256 9bc9e363a134a7617ff2a4908c5d3572729d1be3ba48c7755e00ad97ae443212
ssdeep
1536:8X3HfMvjfKWKI6lZf4DV1P3wpsj2LtTcllL3xuFvBvgs:8n/MvjfXKBruV1Pss6LtTqdx6vBvgs

File size 67.1 KB ( 68663 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-07-21 06:20:02 UTC ( 3 years, 4 months ago )
Last submission 2015-07-21 06:20:02 UTC ( 3 years, 4 months ago )
File names 9159868B184908427BAF18D42D806CB5
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.