× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: de073b053f2271422f8f9bb19d3299e65bb624cedafceb575f6869903f3e0bca
File name: 18E264282692AE5D4F65F242A1606245
Detection ratio: 33 / 57
Analysis date: 2016-01-19 00:27:34 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.Marcher.A 20160119
AhnLab-V3 Android-Trojan/Marcher.f767 20160118
Alibaba A.H.Pay.Marcher 20160118
Antiy-AVL Trojan[Banker:HEUR]/AndroidOS.Marcher.2 20160118
Avast Android:FakeDEB-A [Trj] 20160118
AVG Android/Deng.FYQ 20160118
Avira (no cloud) ANDROID/FakeInstall.BD.Gen 20160118
AVware Trojan.AndroidOS.Generic.A 20160111
Baidu-International Trojan.Win32.Agent.AaA 20160118
BitDefender Android.Trojan.Marcher.A 20160118
CAT-QuickHeal Android.Marcher.A 20160118
Comodo UnclassifiedMalware 20160118
Cyren AndroidOS/Banker.Marcher.A.gen!Eldorado 20160118
DrWeb Android.SmsSpy.88.origin 20160118
Emsisoft Android.Trojan.Marcher.A (B) 20160118
ESET-NOD32 a variant of Android/Spy.Banker.F 20160118
F-Secure Trojan:Android/Marcher.A 20160118
Fortinet Android/Marcher.A!tr 20160118
GData Android.Trojan.Marcher.A 20160118
Ikarus Trojan-Banker.AndroidOS.Marcher.A 20160118
K7GW Spyware ( 004c0f531 ) 20160118
Kaspersky HEUR:Trojan-Banker.AndroidOS.Marcher.b 20160118
McAfee Artemis!97B2C129E4DC 20160118
McAfee-GW-Edition Artemis!Trojan 20160118
eScan Android.Trojan.Marcher.A 20160118
NANO-Antivirus Trojan.Android.SmsSpy.cwzgmc 20160118
Qihoo-360 Trojan.Android.Gen 20160119
Rising APK:Trojan.Banker.j/Android!7.1694 [F] 20160118
Sophos AV Andr/SMStan-A 20160118
Tencent Android.Trojan.Fakeinstall.Hviw 20160119
VIPRE Trojan.AndroidOS.Generic.A 20160119
Zillya Trojan.Banker..962 20160118
Zoner Trojan.AndroidOS.Marcher.A 20160118
AegisLab 20160118
Yandex 20160118
ALYac 20160119
Arcabit 20160118
Bkav 20160118
ByteHero 20160119
ClamAV 20160118
CMC 20160111
F-Prot 20160118
Jiangmin 20160118
K7AntiVirus 20160118
Kingsoft 20160113
Malwarebytes 20160118
Microsoft 20160118
nProtect 20160118
Panda 20160118
SUPERAntiSpyware 20160118
Symantec 20160118
TheHacker 20160116
TotalDefense 20160118
TrendMicro 20160118
TrendMicro-HouseCall 20160119
VBA32 20160117
ViRobot 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.avito. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 7. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.READ_CONTACTS (read contact data)
Activities
com.avito.MainActivity_
com.avito.StartActivity
com.avito.googleplay.DialogActivity
com.avito.googleplay.CommerzbankDialogActivity
Services
com.avito.MainService
com.avito.USSDService
com.avito.googleplay.GPService
Receivers
com.avito.SmsReceiver_
com.avito.BootReceiver
com.avito.ShutdownReceiver
com.avito.AdminReceiver
com.avito.googleplay.ServiceDestroyReceiver
com.avito.AlarmReceiver
Service-related intent filters
com.avito.USSDService
actions: com.android.ussd.IExtendedNetworkService
Activity-related intent filters
com.avito.MainActivity_
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.avito.AlarmReceiver
actions: MainActivity.AlarmAction
com.avito.AdminReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
com.avito.SmsReceiver_
actions: android.provider.Telephony.SMS_RECEIVED
com.avito.ShutdownReceiver
actions: android.intent.action.ACTION_SHUTDOWN, android.intent.action.QUICKBOOT_POWEROFF
com.avito.googleplay.ServiceDestroyReceiver
actions: com.KHLCert.gpservice
com.avito.BootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
40
Uncompressed size
1438517
Highest datetime
2015-08-12 01:01:14
Lowest datetime
2014-11-24 10:09:30
Contained files by extension
png
19
xml
14
ttf
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
19
XML
14
unknown
6
DEX
1
File identification
MD5 97b2c129e4dc27caa98555db411e61ee
SHA1 18e264282692ae5d4f65f242a16062451ea951e9
SHA256 de073b053f2271422f8f9bb19d3299e65bb624cedafceb575f6869903f3e0bca
ssdeep
12288:Pxjss3iSaH7iCjVC3lV7xbP/Deo1x73ZUml3mROllUH5ZEBUsRCTrBJzxiZ:Js37fjVU/71J77pUEmM0ASU

File size 937.3 KB ( 959784 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
dyn-calls apk android sends-sms

VirusTotal metadata
First submission 2015-08-15 02:48:30 UTC ( 3 years, 3 months ago )
Last submission 2015-08-15 02:48:30 UTC ( 3 years, 3 months ago )
File names 18E264282692AE5D4F65F242A1606245
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;launchFlags=0x10000000;component=com.avito/.googleplay.GPService;end
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.
Dynamically called methods
android.content.SharedPreferences$Editor.apply
SMS sent
Destination number:
imei: 975599958736486, country: us, cell: Android, android: 4.0.4, model: samsung Nexus S
Contacted URLs
http://manaclubs.tk/li/get.php/ai=702
69643D313833663465356563646137643962303335363635313933633165633261626126696E666F3D696D65692533412B3937353539393935383733363438362532432B636F756E7472792533412B75732532432B63656C6C2533412B416E64726F69642532432B616E64726F69642533412B342E302E342532432B6D6F64656C2533412B73616D73756E672B4E657875732B53
http://manaclubs.tk/li/set_result.php
626F745F69643D313833663465356563646137643962303335363635313933633165633261626126726573756C743D72656E742532362532362532362B4F4B
http://manaclubs.tk/li/load_sms.php
626F745F69643D313833663465356563646137643962303335363635313933633165633261626126736D733D25374225323264617465253232253341313434303434383231323030302532432532326E756D6265722532322533412532323734333739253232253243253232746578742532322533412532322532374365727461696E6C792B6E6F742E2B4275742B776879253346253237253232253744