× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cba78f16cdffde3524c234f495d5708891c36727c66f8625704911911563d934
File name: Framework.apk
Detection ratio: 30 / 52
Analysis date: 2016-01-03 11:24:46 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Riskware.AndroRat.A 20151224
AegisLab Androrat_1 20160103
AhnLab-V3 Android-Spyware/Androrat.2f84 20160102
Alibaba A.L.Rog.Androrat 20151208
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Climap.1 20160103
Arcabit Android.Riskware.AndroRat.A 20160103
Avast Android:Androrat-I [Trj] 20160103
AVG Android/SpyAgent 20160103
Baidu-International Trojan.Android.AndroRAT.D 20160103
BitDefender Android.Riskware.AndroRat.A 20160103
CAT-QuickHeal Android.AndroRAT.A (PUP) 20160102
ClamAV Andr.Trojan.Androrat 20160103
Cyren AndroidOS/AndroRat.A.gen!Eldorado 20160101
DrWeb Program.Androrat.1.origin 20160103
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20151231
F-Secure Monitoring-Tool:Android/AndroRat.B 20160102
Fortinet Android/AndroRat.A!tr 20160103
GData Android.Riskware.AndroRat.A 20160103
Ikarus Trojan-Spy.AndroidOS.Androrat 20151231
K7GW Trojan ( 0048d4dc1 ) 20160103
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20160103
McAfee Artemis!2791DC646FAF 20160103
McAfee-GW-Edition Artemis!PUP 20160103
Microsoft MonitoringTool:AndroidOS/AndroRat 20160103
eScan Android.Riskware.AndroRat.A 20160103
NANO-Antivirus Trojan.Android.Androrat.cvkmzo 20160103
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160103
Sophos AV Andr/AndroRat-C 20160103
Zillya Trojan.AndroRAT..434 20151231
Zoner Trojan.AndroidOS.AndroRat.A 20160103
Yandex 20160101
AVware 20160103
Bkav 20151231
ByteHero 20160103
CMC 20151231
Comodo 20160103
Emsisoft 20160103
F-Prot 20160103
Jiangmin 20160103
K7AntiVirus 20160103
Malwarebytes 20160103
nProtect 20151231
Panda 20160103
SUPERAntiSpyware 20160103
Symantec 20160102
TheHacker 20160103
TotalDefense 20160103
TrendMicro 20160103
TrendMicro-HouseCall 20160103
VBA32 20160102
VIPRE 20160102
ViRobot 20160103
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Risk summary
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECORD_AUDIO (record audio)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Permission-related API calls
ACCESS_NETWORK_STATE
RECORD_AUDIO
SEND_SMS
VIBRATE
CAMERA
INTERNET
READ_CONTACTS
READ_PHONE_STATE
ACCESS_FINE_LOCATION
Main Activity
my.app.client.LauncherActivity
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118704
Highest datetime
2015-08-09 09:20:36
Lowest datetime
2015-08-09 09:20:36
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 2791dc646fafac64fef27ba3639e1f54
SHA1 1c49d5545ce05b3f415bb68157f9a5cad3e65611
SHA256 cba78f16cdffde3524c234f495d5708891c36727c66f8625704911911563d934
ssdeep
1536:D3HZM1jfKWKIyWGJIjQQIdn191dzjlmSE2dPD+Gr:r5M1jfXKjWW+WF19lmh2ddr

File size 67.1 KB ( 68665 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-08-09 07:35:59 UTC ( 3 years, 3 months ago )
Last submission 2015-08-09 07:35:59 UTC ( 3 years, 3 months ago )
File names Framework.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!