× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ccad414278de526be50bbd05578c88eb56ce845e44a75ad0a9d2f0b0c4f163ca
File name: PincerB2B7D5.apk
Detection ratio: 39 / 57
Analysis date: 2016-04-29 14:39:36 UTC ( 6 days, 11 hours ago )
Antivirus Result Update
AVG Android/Deng.GON 20160429
AVware Trojan.AndroidOS.Generic.A 20160429
Ad-Aware Android.Trojan.InfoStealer.AZ 20160429
AegisLab Pincer 20160429
AhnLab-V3 Android-Trojan/Pincer.21eb 20160429
Alibaba A.H.Pri.Pincer 20160429
Antiy-AVL Trojan[Backdoor]/AndroidOS.Pincer.a 20160429
Arcabit Android.Trojan.InfoStealer.AZ 20160429
Avast Android:SecCert-D [Trj] 20160429
Avira (no cloud) ANDROID/SecCert.A.1 20160429
Baidu-International Trojan.Android.SecCert.A 20160429
BitDefender Android.Trojan.InfoStealer.AZ 20160429
CAT-QuickHeal Android.Pincer.A 20160429
ClamAV Andr.Trojan.Pincer-1 20160429
Comodo UnclassifiedMalware 20160429
Cyren AndroidOS/GenBl.B2B7D599!Olympus 20160429
DrWeb Android.Backdoor.15.origin 20160429
ESET-NOD32 a variant of Android/SecCert.A 20160429
Emsisoft Android.Trojan.InfoStealer.AZ (B) 20160429
F-Prot AndroidOS/Pincer.A 20160429
F-Secure Trojan:Android/Pincer.A 20160429
Fortinet Android/Pincer.A!tr.spy 20160429
GData Android.Trojan.InfoStealer.AZ 20160429
Ikarus AndroidOS.Pincer.A 20160429
Jiangmin Backdoor/AndroidOS.gx 20160429
K7AntiVirus Trojan ( 0001140e1 ) 20160429
K7GW Trojan ( 0001140e1 ) 20160429
Kaspersky HEUR:Trojan-Spy.AndroidOS.SmsThief.fs 20160429
Kingsoft Android.Troj.at_Pincer.a.(kcloud) 20160429
McAfee Artemis!B2B7D5999DCE 20160429
eScan Android.Trojan.InfoStealer.AZ 20160429
NANO-Antivirus Trojan.Android.Pincer.cwzgiz 20160429
Qihoo-360 Trojan.Android.Gen 20160429
Sophos Andr/Pincer-A 20160429
Symantec Trojan.Gen.2 20160429
Tencent a.privacy.pincer 20160429
TrendMicro ANDROIDOS_PINCER.VTD 20160429
TrendMicro-HouseCall ANDROIDOS_PINCER.VTD 20160429
VIPRE Trojan.AndroidOS.Generic.A 20160429
ALYac 20160429
Baidu 20160429
Bkav 20160429
CMC 20160429
Malwarebytes 20160429
McAfee-GW-Edition 20160429
Microsoft 20160429
Panda 20160428
Rising 20160429
SUPERAntiSpyware 20160429
TheHacker 20160429
TotalDefense 20160426
VBA32 20160429
ViRobot 20160429
Yandex 20160428
Zillya 20160429
Zoner 20160429
nProtect 20160429
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.security.certificate. The internal version number of the application is 4. The displayed version string of the application is 4.6. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.READ_LOGS (read sensitive log data)
android.permission.CALL_PRIVILEGED (directly call any phone numbers)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.MODIFY_PHONE_STATE (modify phone status)
Activities
com.security.certificate.ui.MainActivity
com.security.certificate.ui.UssdActivity
com.security.certificate.ui.MessageDialogActivity
Services
com.security.certificate.services.CheckCommandsService
com.security.certificate.services.CheckQueueService
com.security.certificate.services.USSDDumbExtendedNetworkService
Receivers
com.security.certificate.services.ReCheckCommandReceiver
com.security.certificate.services.ReSendQueueReceiver
com.security.certificate.services.SmsSentReceiver
com.security.certificate.services.SmsReceiver
com.security.certificate.services.PhoneCallReceiver
com.security.certificate.services.OnBootReceiver
Service-related intent filters
com.security.certificate.services.USSDDumbExtendedNetworkService
actions: com.android.ussd.IExtendedNetworkService
categories: android.intent.category.DEFAULT
Activity-related intent filters
com.security.certificate.ui.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.security.certificate.services.SmsSentReceiver
actions: android.intent.action.SMS_SENT
com.security.certificate.services.ReCheckCommandReceiver
actions: android.intent.action.RE_CHECK_COMMAND
com.security.certificate.services.ReSendQueueReceiver
actions: android.intent.action.RE_SEND_QUEUE
com.security.certificate.services.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.security.certificate.services.PhoneCallReceiver
actions: android.intent.action.PHONE_STATE
com.security.certificate.services.OnBootReceiver
actions: android.intent.action.BOOT_COMPLETED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
66579
Highest datetime
2013-03-08 20:32:38
Lowest datetime
2013-03-08 20:32:38
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
File identification
MD5 b2b7d5999dce0559d13ab06d30c2c6ec
SHA1 ec14ed31a85f37fad7c7d9c8c0d2aad3a60c8b36
SHA256 ccad414278de526be50bbd05578c88eb56ce845e44a75ad0a9d2f0b0c4f163ca
ssdeep
768:5FCa7E7lJjujSCn0nAXi7IxMdhFB+uzIigU/GmHtzneJuk6/BevfD:3CVJjOn0A8YGEOBB/zHZe8rW

File size 37.6 KB ( 38496 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android ext-prg

VirusTotal metadata
First submission 2013-03-19 20:06:56 UTC ( 3 years, 1 month ago )
Last submission 2016-01-27 13:50:16 UTC ( 3 months, 1 week ago )
File names N108.apk
b2b7d5999dce0559d13ab06d30c2c6ec.ec14ed31a85f37fad7c7d9c8c0d2aad3a60c8b36
N108.apk
PincerB2B7D5.apk
b2b7d5999dce0559d13ab06d30c2c6ec.apk
b2b7d5999dce0559d13ab06d30c2c6ec.log
Recent29-e.apk
M143.apk
J152.apk
1403113583.29.log
b2b7d5999dce0559d13ab06d30c2c6ec.virus
Recent29-e.apk
CCAD414278DE526BE50BBD05578C88EB56CE845E44A75AD0A9D2F0B0C4F163CA.APK.log
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.security.certificate/.services.CheckCommandsService;end
#Intent;component=com.security.certificate/.services.CheckQueueService;end
External programs launched
logcat -d USSDDumbExtendedNetworkService:I *:S
Accessed files
/system/app/Superuser.apk
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.