phone_info.apk

1.48 MB

Analyzed: 2026-05-14 00:12 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
86/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
45/100
High-risk permissions HTTP URLs found
59/100
Caution
Overall trust

Facts

Threat scan 1/75 flagged, 0 suspicious
Permissions 14 requested
Network strings 6 URLs (1 HTTP, 5 HTTPS)
Target SDK 34
Certificate Valid until 2047-12-13 (22 years, suspicious)

Warnings

Threat scan flagged: 1/75 scanners marked this file as malicious.
Found 1 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.REQUEST_DELETE_PACKAGES, android.permission.QUERY_ALL_PACKAGES
Package Name com.android.phoneinfo
Version Code 1
Version Name 1.0
Application Name com.android.phoneinfo.App
Debuggable No
Allow Backup No
Min SDK Android 23 (Marshmallow)
Target SDK Android 34 (Android 14)
Supported ABIs
arm64-v8a armeabi-v7a x86 x86_64

Certificate & Signer

Valid From 2022-12-19 12:52:26
Valid To 2047-12-13 12:52:26
Serial Number 83c6825
Thumbprint 20e37d8287c4a0ebc1ef79047728a3ddfdb110c6
Issuer: C US
Issuer: CN Larry Page
Issuer: DN C:US, CN:Larry Page, L:Mountain View, O:Google LLC, ST:California, OU:Mobile
Issuer: L Mountain View
Issuer: O Google LLC
Issuer: OU Mobile
Issuer: ST California
Subject: C US
Subject: CN Larry Page
Subject: DN C:US, CN:Larry Page, L:Mountain View, O:Google LLC, ST:California, OU:Mobile
Subject: L Mountain View
Subject: O Google LLC
Subject: OU Mobile
Subject: ST California

Security Scan

1 /75
⚠️ Threats Detected
Detected by 1 vendor: K7GW (Trojan ( 005b983c1 ))
Scanned by 75 security vendors
Last scan: 2026-05-13 23:49 UTC
Malicious
1
Suspicious
0
Harmless
0
Undetected
66
Timeout
1
Failure
0

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.778
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.30.0.10666
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260512-02
Avira undetected
No result reported
Engine 8.3.3.24
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 8.2.40(8338)
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike timeout
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.261
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44534AVA:64.31237
Google undetected
No result reported
Engine 1778713285
Gridinsoft undetected
No result reported
Engine 1.0.245.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.52.59496
K7GW malicious
Trojan ( 005b983c1 )
Engine 14.52.59496
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.235
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14532
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26030.3008
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne undetected
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-05-13.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.12.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.6.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1206
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38644
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5601
ZoneAlarm undetected
No result reported
Engine 6.24-114820858
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 2700891:2700891:8e5c1dd:8e5c1dd
tehtris type-unsupported
No result reported

File Signatures

SHA-256 7e89997a52db43b0739676178f0f21027d2edb75cf20f64e17b64e876b5b8d8e
MD5 38c124911610444d2fd38735dc3fff99
SHA-1 5360931ea4679626f98a0cd835a71dadfba3eeff
SSDEEP 24576:ZslVI0SZIFjXOS+A/p4BzrWIGTEvc7cck6+raQ7IGN/LdfZrtzcohyri8t/:KDI0uSXOBA/pgrWISEvc7cUaaQcGVpZy
TLSH T1EA65222677A5D92EDC3741712D0AC33803A5BC82CE16935BF5A03F6D697B6C84F1AAD0
VHASH 1af3bb1ebcfb75d3b424b32195014dae
PERMHASH e6aeb6c107f12c16b4b46240ec93b9a5130c4703e538113352f33b3d1cf608bc

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Java Archive (77.1%), ZIP compressed archive (22.8%) TrID file type guesses with probabilities.
dhash 0000001c1d080008 Perceptual hash used to compare visual similarity of files.
raw md5 3c82de7948a31f9b291bf73206acba95 Raw MD5 hash of the file contents.
extensions version (52), webp (10), kotlin_builtins (7), xml (5), so (4), arsc (1), bin (1), D2 (1), dex (1), json (1), MF (1), prof (1), profm (1), properties (1), Re (1), RSA (1), SF (1), textproto (1), yt (1) File extensions found inside the APK and how many of each.
file types unknown (81), XML (5), ELF (4), DEX (1), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 92 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 2.7 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 96% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

com.android.phoneinfo.presentation.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Native Libraries (1)

libandroidx.graphics.path libandroidx.graphics.path.so

Requested Permissions (15)

view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
Read Privileged Phone State android.permission.READ_PRIVILEGED_PHONE_STATE
android.permission.REQUEST_DELETE_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_DELETE_PACKAGES
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
read your contacts Allows the app to read data about your contacts stored on your tablet. Apps will also have access to the accounts on your tablet that have created contacts. This may include accounts created by apps you have installed. This permission allows apps to save your contact data, and malicious apps may share contact data without your knowledge. android.permission.READ_CONTACTS
read call log This app can read your call history. android.permission.READ_CALL_LOG
read your text messages (SMS or MMS) This app can read all SMS (text) messages stored on your tablet. android.permission.READ_SMS
read your text messages (SMS or MMS) This app can read all SMS (text) messages stored on your tablet. android.permission.READ_SMS
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
android.permission.MANAGE_EXTERNAL_STORAGE Custom app or vendor permission (not publicly documented). android.permission.MANAGE_EXTERNAL_STORAGE
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.android.phoneinfo.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Activities (1)

com.android.phoneinfo.presentation.MainActivity

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (1)

androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-05-14
First Submission 2026-05-14
Last Submission 2026-05-14
Stored Until 2026-06-13