× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cab0c901a9c451762a6f0c3fa154f0917502be3642a19a1fb253ed4f8b024ff0
File name: AdobeFlashPlayer.apk
Detection ratio: 16 / 57
Analysis date: 2016-03-14 17:16:14 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
AegisLab Hqwar 20160314
Alibaba A.H.Rog.Pletor.G 20160314
Antiy-AVL Trojan[Banker:HEUR]/Android.Hqwar.d 20160314
Avira (no cloud) ANDROID/Hqwar.253 20160314
CAT-QuickHeal Android.Banker.Maf69 (PUP) 20160314
DrWeb Android.Locker.1157 20160314
ESET-NOD32 Android/Torec.D 20160314
Fortinet Android/Hqwar.D!tr 20160314
Ikarus Trojan.AndroidOS.Torec 20160314
K7GW Trojan ( 004c13271 ) 20160314
Kaspersky HEUR:Trojan-Banker.AndroidOS.Hqwar.m 20160314
McAfee Artemis!BFF5241D7F16 20160314
McAfee-GW-Edition Artemis!BFF5241D7F16 20160314
NANO-Antivirus Trojan.Android.Locker.eayivj 20160314
Qihoo-360 Trojan.Android.Gen 20160314
Sophos AV Andr/SmsThief-A 20160314
Ad-Aware 20160314
Yandex 20160313
AhnLab-V3 20160314
ALYac 20160314
Arcabit 20160314
Avast 20160314
AVG 20160314
AVware 20160314
Baidu 20160314
Baidu-International 20160314
BitDefender 20160314
Bkav 20160312
ByteHero 20160314
ClamAV 20160311
CMC 20160314
Comodo 20160314
Cyren 20160314
Emsisoft 20160314
F-Prot 20160314
F-Secure 20160314
GData 20160314
Jiangmin 20160314
K7AntiVirus 20160314
Malwarebytes 20160314
Microsoft 20160314
eScan 20160314
nProtect 20160314
Panda 20160314
Rising 20160314
SUPERAntiSpyware 20160314
Symantec 20160310
Tencent 20160314
TheHacker 20160314
TotalDefense 20160314
TrendMicro 20160314
TrendMicro-HouseCall 20160314
VBA32 20160314
VIPRE 20160314
ViRobot 20160314
Zillya 20160314
Zoner 20160314
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.vovtuqnk.itgrtqz. The internal version number of the application is 21. The displayed version string of the application is 2.13. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
Activities
com.vovtuqnk.itgrtqz.yatlg
com.vovtuqnk.itgrtqz.xpmeseywx
com.vovtuqnk.itgrtqz.nojuai.dwsgcg
com.vovtuqnk.itgrtqz.nojuai.icjhblp
com.vovtuqnk.itgrtqz.nojuai.jctxat
com.vovtuqnk.itgrtqz.nojuai.sigthrujod
Services
com.vovtuqnk.itgrtqz.endzyujtfp
com.vovtuqnk.itgrtqz.vlfbhso
com.vovtuqnk.itgrtqz.ycpvmxdm
com.vovtuqnk.itgrtqz.luvtiybwxc
Receivers
com.vovtuqnk.itgrtqz.kamgc
com.vovtuqnk.itgrtqz.lzhgtmtpiv
com.vovtuqnk.itgrtqz.ynjwvaeay
com.vovtuqnk.itgrtqz.fcshuy
Activity-related intent filters
com.vovtuqnk.itgrtqz.yatlg
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.vovtuqnk.itgrtqz.lzhgtmtpiv
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.vovtuqnk.itgrtqz.ynjwvaeay
actions: android.provider.Telephony.SMS_RECEIVED
com.vovtuqnk.itgrtqz.fcshuy
actions: com.slempo.service.activities.HTMLStart
com.vovtuqnk.itgrtqz.kamgc
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.ACTION_EXTERNAL_APPLICATIONS_AVAILABLE
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
999
Uncompressed size
2333690
Highest datetime
2016-03-08 21:51:06
Lowest datetime
2016-03-07 09:34:52
Contained files by extension
png
320
xml
145
RSA
2
SF
2
dex
1
MF
1
dat
1
Contained files by type
unknown
533
PNG
320
XML
145
DEX
1
File identification
MD5 c4813d7d820e8b54c264723467fd404f
SHA1 67cd58d01b4b86f7b626880ffae83e1c346de509
SHA256 cab0c901a9c451762a6f0c3fa154f0917502be3642a19a1fb253ed4f8b024ff0
ssdeep
24576:8cwP6XFFLZGE4C8nARQBkwC6Ez3dBg3C3miKN+jMjQzdQq8eaxrN0rMxVhTtKs6Z:8ckyXLUNnlr1SoNuQGaFNcMxVKsgf

File size 2.0 MB ( 2050679 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-03-14 17:16:14 UTC ( 2 years, 11 months ago )
Last submission 2016-05-13 02:01:02 UTC ( 2 years, 9 months ago )
File names AdobeFlashPlayer.apk
AdobeFlashPlayer.apk
unlodctr.exe
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!