× 쿠키가 비활성화 되어 있습니다! 이 사이트는 작업을 제대로 하려면 쿠키 활성화가 필요합니다.
SHA256: 361bcc34a27e10393c10e7e524d0e09c9dd44e67bc14f17fcd61370f39300dc6
파일 이름: Flash13.4.apk
탐지 비율: 23 / 55
분석 날짜: 2015-11-30 16:38:18 UTC ( 2년, 11개월 전 ) 최신 보기
안티바이러스 결과 업데이트
Ad-Aware Android.Trojan.Helir.B 20151130
AhnLab-V3 Android-Trojan/SMSstealer.86a0 20151130
Alibaba A.H.Pri.Helir.C 20151130
Arcabit Android.Trojan.Helir.B 20151130
Avast Android:Helir-O [Trj] 20151130
AVG Android/Deng.GFR 20151130
Avira (no cloud) ANDROID/Helir.D.Gen 20151130
Baidu-International Trojan.Android.Helir.A 20151130
BitDefender Android.Trojan.Helir.B 20151130
CAT-QuickHeal Android.Helir.A 20151130
Cyren AndroidOS/FakeInst.HJ 20151130
DrWeb Android.Tempur.6.origin 20151130
Emsisoft Android.Trojan.Helir.B (B) 20151130
ESET-NOD32 a variant of Android/Helir.A 20151130
F-Prot AndroidOS/FakeInst.HJ 20151130
F-Secure Trojan:Android/Helir.A 20151130
GData Android.Trojan.Helir.B 20151130
Ikarus Backdoor.AndroidOS.Helir 20151130
Kaspersky HEUR:Backdoor.AndroidOS.Helir.a 20151130
eScan Android.Trojan.Helir.B 20151130
NANO-Antivirus Trojan.Android.Helir.cvmtsz 20151130
Sophos AV Andr/SmsSpy-AF 20151130
Tencent Android.Trojan.Deviceadmin.Auto 20151130
AegisLab 20151130
Yandex 20151130
ALYac 20151130
Antiy-AVL 20151130
AVware 20151130
Bkav 20151130
ByteHero 20151130
ClamAV 20151130
CMC 20151130
Comodo 20151130
Fortinet 20151130
Jiangmin 20151129
K7AntiVirus 20151130
K7GW 20151130
Malwarebytes 20151130
McAfee 20151130
McAfee-GW-Edition 20151130
Microsoft 20151130
nProtect 20151130
Panda 20151130
Qihoo-360 20151130
Rising 20151129
SUPERAntiSpyware 20151130
Symantec 20151129
TheHacker 20151127
TrendMicro 20151130
TrendMicro-HouseCall 20151130
VBA32 20151130
VIPRE 20151130
ViRobot 20151130
Zillya 20151130
Zoner 20151130
The file being studied is Android related! APK Android file more specifically. The application's main package name is kr.grep.ns1. The internal version number of the application is 37. The displayed version string of the application is 3.7. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.WRITE_CONTACTS (write contact data)
android.permission.SEND_SMS (send SMS messages)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_CALL_LOG (read the user's call log.)
Activities
com.android.netservice.MainActivity
com.android.netservice.SecondActivity
Services
com.android.netservice.MainService
com.android.dail.NewService
com.android.mail.EmailService
com.android.dail.SimpleWindow
Receivers
com.android.netservice.BootReceiver
com.android.netservice.SMSReceiver
com.android.deviceadmin.DeviceAdmin
com.android.dail.DailReceiver
Activity-related intent filters
com.android.netservice.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.android.dail.DailReceiver
actions: android.intent.action.NEW_OUTGOING_CALL, android.intent.action.PHONE_STATE
com.android.netservice.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.android.netservice.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
com.android.deviceadmin.DeviceAdmin
actions: android.app.action.DEVICE_ADMIN_ENABLED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
42
Uncompressed size
601157
Highest datetime
2015-11-30 21:33:50
Lowest datetime
2015-11-30 21:33:50
Contained files by extension
png
11
xml
10
map
3
txt
3
mf
1
RSA
1
dex
1
MF
1
SF
1
Contained files by type
unknown
20
XML
10
PNG
10
DEX
1
JPG
1
File identification
MD5 2da07fdb53b511a452c1ba65483a5c1b
SHA1 8eb95877c62ffc2d915323cc66653f005a3d5b31
SHA256 361bcc34a27e10393c10e7e524d0e09c9dd44e67bc14f17fcd61370f39300dc6
ssdeep
6144:MZ4aJMGiYpv49SyLvqDXnlDgJeEqTmQBdAwj/CC3Ry:MZ1MzeDXNggE8mQ9Ry

File size 270.7 KB ( 277181 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-11-30 16:15:35 UTC ( 2년, 11개월 전 )
Last submission 2016-09-09 10:23:10 UTC ( 2년, 2개월 전 )
파일 이름 Flash13.4.apk
filename
댓글이 없습니다.. 이 항목에 대해 댓글을 작성한 바이러스토탈 커뮤니티 회원이 아직 없습니다. 첫 번째로 댓글을 작성해 보십시오!

댓글 남기기...

?
댓글 달기

로그인 안됨. 등록된 사용자만 댓글을 남길 수 있습니다. 로그인하여 댓글을 남겨보십시오!

투표가 없습니다.. 아직 이 항목에 투표한 사람이 없습니다. 첫 번째로 투표해 보십시오!