× ¡Las cookies están desactivadas! Esta página requiere que las cookies estén activadas para funcionar correctamente
SHA256: 3aee81db24540fb6b3666a38683259fd32713187ec6e0b421da9b91bd216205f
Nombre: 3aee81db24540fb6b3666a38683259fd32713187ec6e0b421da9b91bd216205f.apk
Detecciones: 40 / 62
Fecha de análisis: 2018-07-22 13:11:26 UTC ( hace 4 meses, 3 semanas )
Antivirus Resultado Actualización
Ad-Aware Android.Trojan.SMSSend.ND 20180722
AegisLab SUSPICIOUS 20180722
AhnLab-V3 Android-Trojan/SMSAgent.10299 20180721
Alibaba A.H.Pay.Safeguard 20180713
Antiy-AVL Trojan[Spy]/Android.SmForw 20180722
Arcabit Android.Trojan.SMSSend.ND 20180722
Avast Android:RuSMS-AH [Trj] 20180722
Avast-Mobile Android:RuSMS-AH [Trj] 20180722
AVG Android:RuSMS-AH [Trj] 20180722
Avira (no cloud) ANDROID/SmsAgent.EB.Gen 20180722
AVware Trojan.AndroidOS.Generic.A 20180722
Babable Malware.HighConfidence 20180406
Baidu Android.Trojan.Agent.blm 20180717
BitDefender Android.Trojan.SMSSend.ND 20180722
CAT-QuickHeal Android.Agent.GQ 20180722
Cyren AndroidOS/GenBl.67235B16!Olympus 20180722
DrWeb Android.SmsBot.72.origin 20180722
Emsisoft Android.Trojan.SMSSend.ND (B) 20180722
ESET-NOD32 Android/TrojanSMS.Agent.ACK 20180722
F-Prot AndroidOS/Agent.IR 20180722
F-Secure Trojan:Android/SmsSend.IE 20180722
Fortinet Android/SmsSend.ND!tr 20180722
GData Android.Trojan.SMSSend.ND 20180722
Ikarus Trojan-SMS.AndroidOS.PeiPeiDu 20180722
Jiangmin TrojanSpy.AndroidOS.bm 20180722
K7GW Trojan ( 0001140e1 ) 20180722
Kaspersky HEUR:Trojan-Spy.AndroidOS.SmForw.al 20180722
MAX malware (ai score=100) 20180722
McAfee Artemis!67235B16BC2F 20180722
McAfee-GW-Edition Artemis!Trojan 20180722
Microsoft Trojan:Win32/Bitrep.A 20180722
eScan Android.Trojan.SMSSend.ND 20180722
NANO-Antivirus Trojan.Android.ApkProtect.dkpmdl 20180722
Qihoo-360 Trojan.Android.Gen 20180722
Sophos AV Andr/SmsSpy-BH 20180722
Symantec Trojan.Gen.2 20180721
Tencent Trojan.Android.Smsthief.bx 20180722
Trustlook Android.Malware.Trojan 20180722
Zillya Trojan.Agent.Android.119033 20180720
ZoneAlarm by Check Point HEUR:Trojan-Spy.AndroidOS.SmForw.al 20180722
ALYac 20180722
Bkav 20180719
ClamAV 20180722
CMC 20180722
Comodo 20180722
CrowdStrike Falcon (ML) 20180530
Cybereason 20180225
Cylance 20180722
eGambit 20180722
Endgame 20180711
Sophos ML 20180717
K7AntiVirus 20180722
Kingsoft 20180722
Malwarebytes 20180722
Palo Alto Networks (Known Signatures) 20180722
Panda 20180722
Rising 20180722
SentinelOne (Static ML) 20180701
SUPERAntiSpyware 20180722
TACHYON 20180722
TheHacker 20180720
TotalDefense 20180722
TrendMicro 20180722
TrendMicro-HouseCall 20180722
VBA32 20180720
VIPRE 20180722
ViRobot 20180722
Webroot 20180722
Yandex 20180720
Zoner 20180721
The file being studied is Android related! APK Android file more specifically. The application's main package name is google.service. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.READ_LOGS (read sensitive log data)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.BLUETOOTH (create Bluetooth connections)
android.permission.INTERNET (full Internet access)
android.permission.BLUETOOTH_ADMIN (bluetooth administration)
android.permission.SEND_SMS (send SMS messages)
android.permission.ADD_SYSTEM_SERVICE (Unknown permission from android reference)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECORD_AUDIO (record audio)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.READ_SMS (read SMS or MMS)
android.permission.KILL_BACKGROUND_PROCESSES (kill background processes)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_CONTACTS (read contact data)
android.permission.MOUNT_UNMOUNT_FILESYSTEMS (mount and unmount file systems)
android.permission.RESTART_PACKAGES (kill background processes)
Activities
google.service.MainActivity
Services
google.service.MessengerService
Receivers
google.service.BootReceiver
google.service.deviceAdminReceiver
google.service.AlarmReceiver
Activity-related intent filters
google.service.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
google.service.AlarmReceiver
actions: googleservice.alarm.action
google.service.BootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, android.media.RINGER_MODE_CHANGED
google.service.deviceAdminReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
16
Uncompressed size
250673
Highest datetime
2014-04-13 00:56:26
Lowest datetime
2014-04-13 00:56:26
Contained files by extension
png
5
xml
4
so
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
5
XML
4
unknown
4
ELF
2
DEX
1
Compressed bundles
File identification
MD5 67235b16bc2fab6836847ea51703e298
SHA1 40f1146e35096e44dab5276d21e7e2e35632053e
SHA256 3aee81db24540fb6b3666a38683259fd32713187ec6e0b421da9b91bd216205f
ssdeep
3072:jpQBURtN1LuPSWiZVw1D6fFA3yPNo4CC7IdK:jpQWr1L/7Zq11yPiI7IdK

Tamaño del fichero 108.2 KB ( 110798 bytes )
Tipo Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2014-04-13 09:11:37 UTC ( hace 4 años, 8 meses )
Last submission 2018-07-22 13:11:26 UTC ( hace 4 meses, 3 semanas )
Nombres 67235B16BC2FAB6836847EA51703E298
3aee81db24540fb6b3666a38683259fd32713187ec6e0b421da9b91bd216205f.apk
40f1146e35096e44dab5276d21e7e2e35632053e
40f1146e35096e44dab5276d21e7e2e35632053e.txt
67235B16BC2FAB6836847EA51703E298
2014-05-06-CMD-8.apk
google.service.apk
output.24984612.txt
67235B16BC2FAB6836847EA51703E298.apk
40f1146e35096e44dab5276d21e7e2e35632053e.apk
40f1146e35096e44dab5276d21e7e2e35632053e.apk
_SUSPECT_
1403185202.16.log
file-6843175_apk
67235B16BC2FAB6836847EA51703E298.apk
J9.apk
apk.apk
3aee81db24540fb6b3666a38683259fd32713187ec6e0b421da9b91bd216205f.apk
__.apk
Google.apk
ygf4trxUUmggu7b8S4rz20150608-32191-391tev
67235b16bc2fab6836847ea51703e298.apk
40f1146e35096e44dab5276d21e7e2e35632053e.apk
0074.apk
24984612
No hay comentarios. Ningún usuario ha comentado aún. ¡Sea el primero en hacerlo!

Deje su comentario...

?
Enviar comentario

No ha iniciado sesión. Solo los usuarios registrados pueden escribir comentarios.

No hay votos. Nadie ha votado aún. ¡Sea el primero!