NVISO ApkScan malware analysis report

October 23, 2017

 
General information
File nametank.apk
Other known file namesNone
OriginManually uploaded by anonymous user [2013-07-10 21:52:40]
MD5 hasha7f9f6ec9edb19ae708369ec24e26d94
SHA256 hash0bca5c98779c46c07dc95eec0cf9b9bd0ba209d72efbae008e6b18379a34e600
File size461.54 KB
WorkerUnknown
Static malware analysis
Android manifest (AndroidManifest.xml)
Permissions
INSTALL_PACKAGES Allows an application to install packages.
INTERNET Allows applications to open network sockets.
READ_PHONE_STATE Allows read only access to phone state.
RECEIVE_BOOT_COMPLETED Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting.
RECEIVE_SMS Allows an application to monitor incoming SMS messages, to record or perform processing on them.
RESTART_PACKAGES This constant was deprecated in API level 8. The restartPackage(String) API is no longer supported.
SEND_SMS Allows an application to send SMS messages.
VIBRATE Allows access to the vibrator
WRITE_EXTERNAL_STORAGE Allows an application to write to external storage.
Services
Class ee.maestro.slaming.Pologitelno
Class ee.maestro.slaming.Pologitelno
Virus Total scan results
AntiVirAndroid/TrojanSMS.FakeInst.U
AvastAndroid:FakeInst-DA [Trj]
AVGAndroid_dc.AAJQ
BitDefenderAndroid.Trojan.FakeInst.CJ
CAT-QuickHealAndroid.RuFraud.E
CommtouchAndroidOS/FakeInst.DM
ComodoUnclassifiedMalware
DrWebAndroid.SmsSend.329.origin
EmsisoftAndroid.Trojan.FakeInst.CJ (B)
ESET-NOD32Android/TrojanSMS.FakeInst.U
F-ProtAndroidOS/FakeInst.DM
F-SecureTrojan:Android/Fakeinst.AA
FortinetRiskware/FakeInst!Android
GDataAndroid.Trojan.FakeInst.CJ
IkarusAndroidOS.Trojan.FakeInst
KasperskyHEUR:Trojan-SMS.AndroidOS.FakeInst.a
KingsoftAndroid.Troj.FakeInst.a.(kcloud)
NANO-AntivirusTrojan.FakeInst.bcwivn
SophosAndr/FakeInst-P
TrendMicro-HouseCallTROJ_GEN.RCBOHAV
VIPRETrojan.AndroidOS.Generic.A
Disassembled source code
Hardcoded URL's
Dynamic malware analysis
Screenshot or animated GIF of the analysed application

No screenshot taken during dynamic analysis.

This most likely means that your application did not run correctly on our test device.
Our test devices run Android 4.1 Jelly Bean (API level 16), and currently do not support hardware OpenGL acceleration.

Since the application did not run correctly, the results in the sections below could be incomplete!

Disk activity
Accessed files
No files were accessed.
Network activity
Opened network connections
No network connections were opened.
Automatically placed calls and text messages
Placed phone calls
No phone calls were placed automatically.
Sent SMS messages
No text messages were placed automatically.
Cryptographic activity
Used encryption keys
No cryptographic activity detected.
Encryption operations
No cryptographic activity detected.
Decryption operations
No cryptographic activity detected.
Information leakage
Network information leakage
No network information leakage detected.
SMS information leakage
No SMS information leakage detected.
File information leakage
No file information leakage detected.
Miscellaneous
Started services
No services were started.
Output generated by ADB logcat
No logfile stored (feature added July 1, 2014).
report overview | terms & conditions | support & feedback | nviso.be