14______.apk

4.37 MB

Analyzed: 2026-02-14 22:20 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
21/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
93/100
High-risk permissions AllowBackup enabled Low data access
34/100
High Risk
Overall trust

Facts

Threat scan 19/76 flagged, 0 suspicious
Permissions 10 requested
Network strings No URL strings detected
Target SDK 36
Certificate Valid until 2053-06-21 (27 years, suspicious)

Warnings

Threat scan flagged: 19/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES, android.permission.QUERY_ALL_PACKAGES
AllowBackup is enabled.
Package Name com.company.application
Version Code 1
Version Name 1.0
Debuggable No
Allow Backup Yes
Min SDK Android 26 (Oreo)
Target SDK Android 36 (Unknown)
Supported ABIs
arm64-v8a armeabi-v7a x86 x86_64

Certificate & Signer

Valid From 2026-02-03 12:14:14
Valid To 2053-06-21 12:14:14
Serial Number 7d2e0f57b0f58af6
Thumbprint 319d4de1154b4db37bdfcdde0045b6c5beb40628
Issuer: C FR
Issuer: CN Xxdtmutbwomi Vehehkdjxr Corp
Issuer: DN C:FR, CN:Xxdtmutbwomi Vehehkdjxr Corp, L:Ewmsaixbee, O:Xxdtmutbwomi Vehehkdjxr Corp, ST:OB, OU:Ruiniiuexkepa
Issuer: L Ewmsaixbee
Issuer: O Xxdtmutbwomi Vehehkdjxr Corp
Issuer: OU Ruiniiuexkepa
Issuer: ST OB
Subject: C FR
Subject: CN Xxdtmutbwomi Vehehkdjxr Corp
Subject: DN C:FR, CN:Xxdtmutbwomi Vehehkdjxr Corp, L:Ewmsaixbee, O:Xxdtmutbwomi Vehehkdjxr Corp, ST:OB, OU:Ruiniiuexkepa
Subject: L Ewmsaixbee
Subject: O Xxdtmutbwomi Vehehkdjxr Corp
Subject: OU Ruiniiuexkepa
Subject: ST OB

Security Scan

19 /76
⚠️ Threats Detected
Detected by 19 vendors: AhnLab-V3 (Dropper/Android.Banker.1322973), Avast-Mobile (Android:Evo-gen [Trj]), Avira (ANDROID/Malformed.ZIP.Gen)
Scanned by 76 security vendors
Last scan: 2026-02-06 11:09 UTC
Malicious
19
Suspicious
0
Harmless
0
Undetected
44
Timeout
4
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.744
AVG timeout
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
Dropper/Android.Banker.1322973
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast timeout
No result reported
Engine 23.9.8494.0
Avast-Mobile malicious
Android:Evo-gen [Trj]
Engine 260206-00
Avira malicious
ANDROID/Malformed.ZIP.Gen
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Downloader.ASB
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet malicious
Malicious (score: 99)
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb malicious
Android.Banker.Mamont.215
Engine 7.0.74.11120
ESET-NOD32 malicious
Android/TrojanDropper.Agent.NCK trojan
Engine 18.2.18.0
Elastic failure
No result reported
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
Malware.ANDROID/Malformed.ZIP.Gen
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43443AVA:64.30617
Google undetected
No result reported
Engine 1770368454
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus malicious
Trojan-Dropper.AndroidOS.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.34.58508
K7GW malicious
Trojan ( 005cbb901 )
Engine 14.34.58509
Kaspersky malicious
HEUR:Trojan-Banker.AndroidOS.Mamont.pac
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.207
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13644
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft malicious
Trojan:Script/Wacatac.B!ml
Engine 1.1.25110.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh timeout
No result reported
Sophos malicious
Andr/Xgen-BVU
Engine 3.3.1.0
Symantec malicious
Trojan.Gen.NPE
Engine 1.22.0.0
SymantecMobileInsight malicious
AppRisk:Generisk
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-06.02
Tencent malicious
a.privacy.BankerAjina
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.9.0
TrellixENS timeout
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook malicious
Android.PUA.General
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist malicious
ABApplication.WF
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1139
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38391
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5538
ZoneAlarm malicious
Andr/Xgen-BVU
Engine 6.22-112233688
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 4cb4b44:4cb4b44:fa65098:fa65098
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 b9deff72d1c258ea4a6ec37d79b16008323dd71955d8d03e558d82ceab533a0b
MD5 53250d39bbb0b611d088c2314129304d
SHA-1 b2c65db0a422c036bbdb9a2876e08c063342eda2
SSDEEP 49152:JHJdx1+DpDAudXINWpNgDRDEIHfijF+D1Z7OuGsN23JgBBpIL0mRKGLRIB+cKAY5:zQ/FMRD9Z7rPQi3GNIPEXC9G3Ghebl
TLSH T1EA26018ABB45453FC47A48360BA647613B97DC128DC79B07A598372C6D772880F6EFC8
VHASH f1b881bd84f36fc7377a845d2a4d5445

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 0000001e1e191410 Perceptual hash used to compare visual similarity of files.
raw md5 7b5606b136164d0642dadc897b69efc5 Raw MD5 hash of the file contents.
extensions xml (262), png (157), version (67), webp (10), kotlin_builtins (7), txt (5), so (4), ttf (2), a (1), apk (1), arsc (1), b (1), bin (1), dex (1), json (1), MF (1), prof (1), profm (1), properties (1), RSA (1), SF (1), textproto (1) File extensions found inside the APK and how many of each.
file types unknown (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 528 Number of files contained within the archive.
password virus
type APK Container type detected for the analyzed file.
uncompressed size 5.1 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.company.application.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (1)

com.company.application.core.service.ApplicationService
Actions
android.net.VpnService android.net.VpnService

Receiver Intents (2)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION
com.company.application.core.utils.InstallResultReceiver
Actions
com.company.application.INSTALL_RESULT com.company.application.INSTALL_RESULT

Native Libraries (1)

libandroidx.graphics.path libandroidx.graphics.path.so

Requested Permissions (11)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
Bind Vpn Service android.permission.BIND_VPN_SERVICE
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
Install Packages android.permission.INSTALL_PACKAGES
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE
android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_CONNECTED_DEVICE
change network connectivity Allows the app to change the state of network connectivity. android.permission.CHANGE_NETWORK_STATE
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.company.application.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Activities (3)

com.company.application.MainActivity
com.company.application.ui.activity.RequestInstallActivity
com.company.application.ui.activity.Install

Services (1)

com.company.application.core.service.ApplicationService

Broadcast Receivers (2)

com.company.application.core.utils.InstallResultReceiver com.company.application.core.utils.InstallResultReceiver
Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (1)

androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-02-14
First Submission 2026-02-14
Last Submission 2026-02-14
Stored Until 2026-03-16