× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b01bd948d1e67f1cc9a13ae1896424a01e0d31789833dd602215d6520427498e
File name: EC6F8ADC0583A479D250F8DC1DC4B9F1
Detection ratio: 37 / 60
Analysis date: 2018-01-01 04:12:38 UTC ( 10 months, 3 weeks ago )
Antivirus Result Update
AegisLab Backdoor.AndroidOS.Climap.a!c 20180101
Alibaba A.H.Rem.Climap.C 20171229
Antiy-AVL Trojan[Backdoor]/Android.Climap 20180101
Arcabit Android.Riskware.AndroRat.A 20180101
Avast Android:Androrat-I [Trj] 20180101
Avast-Mobile Android:Androrat-I [Trj] 20171231
AVG Android:Androrat-I [Trj] 20180101
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20171231
AVware Trojan.AndroidOS.Generic.A 20180101
Baidu Android.Trojan.AndroRAT.k 20171227
BitDefender Android.Riskware.AndroRat.A 20180101
CAT-QuickHeal Android.Climap.GEN212 20171230
ClamAV Andr.Trojan.Androrat-1 20171231
Cyren AndroidOS/AndroRat.A.gen!Eldorado 20180101
DrWeb Android.Androrat.1.origin 20180101
Emsisoft Android.Riskware.AndroRat.A (B) 20180101
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20180101
F-Secure Monitoring-Tool:Android/AndroRat.B 20180101
Fortinet Android/AndroRat.A!tr 20180101
GData Android.Riskware.AndroRat.A 20180101
Ikarus Trojan-Spy.AndroidOS.Androrat 20171231
K7GW Spyware ( 004c0e381 ) 20171231
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20180101
MAX malware (ai score=71) 20180101
McAfee Artemis!EC6F8ADC0583 20180101
McAfee-GW-Edition Artemis!PUP 20180101
Microsoft MonitoringTool:AndroidOS/AndroRat 20171231
NANO-Antivirus Trojan.Android.TrjGen.dzzhxe 20180101
Qihoo-360 Trojan.Android.Gen 20180101
Rising Backdoor.Android.Climap.a (CLASSIC) 20171230
Sophos AV Andr/AndroRat-C 20180101
Symantec Trojan.Gen.2 20171231
Tencent Trojan.Android.Climap.a 20180101
Trustlook Android.Malware.Spyware 20180101
WhiteArmor Malware.HighConfidence 20171226
Zillya Trojan.AndroRAT..193 20171231
ZoneAlarm by Check Point HEUR:Backdoor.AndroidOS.Climap.a 20180101
Ad-Aware 20171225
ALYac 20180101
Bkav 20171229
CMC 20180101
Comodo 20180101
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180101
eGambit 20180101
Endgame 20171130
F-Prot 20180101
Sophos ML 20170914
Jiangmin 20180101
K7AntiVirus 20171231
Kingsoft 20180101
Malwarebytes 20180101
eScan 20180101
nProtect 20171231
Palo Alto Networks (Known Signatures) 20180101
Panda 20171231
SentinelOne (Static ML) 20171224
SUPERAntiSpyware 20171231
TheHacker 20171229
TotalDefense 20171231
TrendMicro 20180101
VBA32 20171229
VIPRE 20180101
ViRobot 20180101
Webroot 20180101
Yandex 20171229
Zoner 20180101
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECORD_AUDIO (record audio)
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118544
Highest datetime
2015-06-16 07:44:12
Lowest datetime
2015-06-16 07:44:12
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 ec6f8adc0583a479d250f8dc1dc4b9f1
SHA1 7fcc3bdf466f62c67e376c8289eb6dc67b27f722
SHA256 b01bd948d1e67f1cc9a13ae1896424a01e0d31789833dd602215d6520427498e
ssdeep
1536:B3HjMijfKWKIR+ZQYQ7sCxFQjOY+cbCbj5YKux6H:RDMijfXKBvQpxFQjFqjg6H

File size 67.0 KB ( 68604 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-06-21 06:31:14 UTC ( 3 years, 5 months ago )
Last submission 2015-06-21 06:31:14 UTC ( 3 years, 5 months ago )
File names EC6F8ADC0583A479D250F8DC1DC4B9F1
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=BootReceiver;component=my.app.client/.Client;end