× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ccad414278de526be50bbd05578c88eb56ce845e44a75ad0a9d2f0b0c4f163ca
File name: M143.apk
Detection ratio: 38 / 57
Analysis date: 2015-02-13 02:52:41 UTC ( 2 weeks, 4 days ago )
Antivirus Result Update
AVG Android/Deng.C 20150213
AVware Trojan.AndroidOS.Generic.A 20150213
Ad-Aware Android.Trojan.InfoStealer.AZ 20150213
AegisLab Pincer 20150213
AhnLab-V3 Android-Malicious/Pincer 20150212
Alibaba A.H.Pri.Pincer 20150213
Avast Android:SecCert-D [Trj] 20150213
Avira Android/SecCert.A.1 20150213
Baidu-International Backdoor.AndroidOS.Pincer.AnIe 20150212
BitDefender Android.Trojan.InfoStealer.AZ 20150213
CAT-QuickHeal Android.Pincer.A 20150212
ClamAV Andr.Trojan.Pincer 20150213
Comodo UnclassifiedMalware 20150212
Cyren AndroidOS/GenBl.B2B7D599!Olympus 20150213
DrWeb Android.Backdoor.15.origin 20150213
ESET-NOD32 a variant of Android/SecCert.A 20150213
Emsisoft Android.Trojan.InfoStealer.AZ (B) 20150213
F-Prot AndroidOS/Pincer.A 20150213
F-Secure Trojan:Android/Pincer.A 20150213
Fortinet Android/Pincer.A!tr.spy 20150213
GData Android.Trojan.InfoStealer.AZ 20150213
Ikarus AndroidOS.Pincer.A 20150212
Jiangmin Backdoor/AndroidOS.amea 20150212
K7AntiVirus Trojan ( 0001140e1 ) 20150212
K7GW Trojan ( 0001140e1 ) 20150212
Kaspersky HEUR:Backdoor.AndroidOS.Pincer.a 20150212
Kingsoft Android.Troj.at_Pincer.a.(kcloud) 20150213
McAfee Artemis!B2B7D5999DCE 20150213
MicroWorld-eScan Android.Trojan.InfoStealer.AZ 20150213
NANO-Antivirus Trojan.Android.Pincer.cwzgiz 20150213
Norman Pincer.B 20150212
Qihoo-360 Win32/Backdoor.DoS.ff6 20150213
Sophos Andr/Pincer-A 20150213
Tencent Dos.Backdoor.Pincer.Pfjb 20150213
TrendMicro ANDROIDOS_PINCER.VTD 20150213
TrendMicro-HouseCall ANDROIDOS_PINCER.VTD 20150213
VIPRE Trojan.AndroidOS.Generic.A 20150213
Zoner Spyware.AndroidOS.LuckyCat.A 20150211
ALYac 20150213
Agnitum 20150212
Antiy-AVL 20150212
Bkav 20150212
ByteHero 20150213
CMC 20150211
Malwarebytes 20150213
McAfee-GW-Edition 20150213
Microsoft 20150213
Panda 20150212
Rising 20150212
SUPERAntiSpyware 20150213
Symantec 20150213
TheHacker 20150212
TotalDefense 20150213
VBA32 20150211
ViRobot 20150213
Zillya 20150213
nProtect 20150212
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.security.certificate. The internal version number of the application is 4. The displayed version string of the application is 4.6. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Risk summary
The studied DEX file makes use of API reflection
Permissions that allow the application to manipulate SMS
Permissions that allow the application to perform calls
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_LOGS (read sensitive log data)
android.permission.CALL_PRIVILEGED (directly call any phone numbers)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.MODIFY_PHONE_STATE (modify phone status)
Permission-related API calls
CHANGE_COMPONENT_ENABLED_STATE
READ_PHONE_STATE
SEND_SMS
INTERNET
READ_LOGS
Main Activity
com.security.certificate.ui.MainActivity
Activities
com.security.certificate.ui.MainActivity
com.security.certificate.ui.UssdActivity
com.security.certificate.ui.MessageDialogActivity
Services
com.security.certificate.services.CheckCommandsService
com.security.certificate.services.CheckQueueService
com.security.certificate.services.USSDDumbExtendedNetworkService
Receivers
com.security.certificate.services.ReCheckCommandReceiver
com.security.certificate.services.ReSendQueueReceiver
com.security.certificate.services.SmsSentReceiver
com.security.certificate.services.SmsReceiver
com.security.certificate.services.PhoneCallReceiver
com.security.certificate.services.OnBootReceiver
Service-related intent filters
com.security.certificate.services.USSDDumbExtendedNetworkService
actions: com.android.ussd.IExtendedNetworkService
categories: android.intent.category.DEFAULT
Activity-related intent filters
com.security.certificate.ui.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.security.certificate.services.SmsSentReceiver
actions: android.intent.action.SMS_SENT
com.security.certificate.services.ReCheckCommandReceiver
actions: android.intent.action.RE_CHECK_COMMAND
com.security.certificate.services.ReSendQueueReceiver
actions: android.intent.action.RE_SEND_QUEUE
com.security.certificate.services.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.security.certificate.services.PhoneCallReceiver
actions: android.intent.action.PHONE_STATE
com.security.certificate.services.OnBootReceiver
actions: android.intent.action.BOOT_COMPLETED
Code-related observations
The application does not load any code dynamically
The application contains reflection code
The application does not contain native code
The application does not contain cryptographic code
Application certificate information
Application bundle files
Interesting strings
File identification
MD5 b2b7d5999dce0559d13ab06d30c2c6ec
SHA1 ec14ed31a85f37fad7c7d9c8c0d2aad3a60c8b36
SHA256 ccad414278de526be50bbd05578c88eb56ce845e44a75ad0a9d2f0b0c4f163ca
ssdeep
768:5FCa7E7lJjujSCn0nAXi7IxMdhFB+uzIigU/GmHtzneJuk6/BevfD:3CVJjOn0A8YGEOBB/zHZe8rW

File size 37.6 KB ( 38496 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android ext-prg

VirusTotal metadata
First submission 2013-03-19 20:06:56 UTC ( 1 year, 11 months ago )
Last submission 2015-02-13 02:52:41 UTC ( 2 weeks, 4 days ago )
File names 1403113583.29.log
N108.apk
b2b7d5999dce0559d13ab06d30c2c6ec.ec14ed31a85f37fad7c7d9c8c0d2aad3a60c8b36
b2b7d5999dce0559d13ab06d30c2c6ec.apk
b2b7d5999dce0559d13ab06d30c2c6ec.log
M143.apk
J152.apk
N108.apk
Recent29-e.apk
Recent29-e.apk
CCAD414278DE526BE50BBD05578C88EB56CE845E44A75AD0A9D2F0B0C4F163CA.APK.log
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0x4cde7fc4

FileType
ZIP

ZipCompression
Deflated

ZipUncompressedSize
828

ZipCompressedSize
378

FileAccessDate
2015:02:13 03:52:56+01:00

ZipFileName
res/layout/enter_user_id_dialog.xml

ZipBitFlag
0x0008

FileCreateDate
2015:02:13 03:52:56+01:00

ZipModifyDate
2013:03:08 20:32:19

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.security.certificate/.services.CheckCommandsService;end
#Intent;component=com.security.certificate/.services.CheckQueueService;end
External programs launched
logcat -d USSDDumbExtendedNetworkService:I *:S
Accessed files
/system/app/Superuser.apk
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.