___2.apk

5.78 MB

Analyzed: 2026-03-09 15:27 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
70/100
Threat scan flagged
Privacy Permissions & network
45/100
55/100
Caution
Overall trust

Facts

Threat scan 4/76 flagged, 0 suspicious
Permissions 11 requested
Network strings 1 URLs (0 HTTP, 1 HTTPS)
Target SDK Unknown
Certificate Valid until 2053-04-18 (27 years, suspicious)

Warnings

Threat scan flagged: 4/76 scanners marked this file as malicious.

Analysis Coverage

This report is partial. Some core metadata could not be extracted.
version
Package Name com.dog.RestartSensor
Version Code
Version Name
Debuggable No
Allow Backup No
Min SDK Unknown
Target SDK Unknown
Supported ABIs
Universal

Certificate & Signer

Valid From 2025-12-01 09:01:44
Valid To 2053-04-18 09:01:44
Serial Number 9bee9964453b56f6
Thumbprint 01b3895148510bf3f591c64e30d2c8e272a4b89d
Issuer: C beijing
Issuer: CN vgeh
Issuer: DN C:beijing, CN:vgeh, L:beijing, O:bf1743528068699, ST:beijing, OU:sc1743528068699
Issuer: L beijing
Issuer: O bf1743528068699
Issuer: OU sc1743528068699
Issuer: ST beijing
Subject: C beijing
Subject: CN vgeh
Subject: DN C:beijing, CN:vgeh, L:beijing, O:bf1743528068699, ST:beijing, OU:sc1743528068699
Subject: L beijing
Subject: O bf1743528068699
Subject: OU sc1743528068699
Subject: ST beijing

Security Scan

4 /76
⚠️ Threats Detected
Detected by 4 vendors: Avast-Mobile (Android:Evo-gen [Trj]), BitDefenderFalx (Android.Trojan.SpyAgent.RV), Kaspersky (HEUR:Trojan-Banker.AndroidOS.Agent.ws)
Scanned by 76 security vendors
Last scan: 2026-03-09 15:27 UTC
Malicious
4
Suspicious
0
Harmless
0
Undetected
63
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac failure
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.756
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile malicious
Android:Evo-gen [Trj]
Engine 260309-08
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Trojan.SpyAgent.RV
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43794AVA:64.30804
Google undetected
No result reported
Engine 1773064896
Gridinsoft undetected
No result reported
Engine 1.0.240.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.40.58821
K7GW undetected
No result reported
Engine 14.40.58823
Kaspersky malicious
HEUR:Trojan-Banker.AndroidOS.Agent.ws
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos malicious
Andr/Xgen2-ATJ
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-09.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1161
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38469
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5558
ZoneAlarm undetected
No result reported
Engine 6.23-113518728
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 71c2a09:71c2a09:86681f2:86681f2
tehtris type-unsupported
No result reported

File Signatures

SHA-256 76e78a20d024c9788a1138e866ea8e9e7da60088a72b4d2c4e419b1f8dd90b43
MD5 a37f6c07b07767b5194e889d0cb3fec3
SHA-1 07612ab7870dc595e2d23133c69c084307d3078b
SSDEEP 98304:6108ENRCWIbbpB0YfNIv+f80f7RJqQ1Tu6Ds+yg4LMNylaPXt1wAxLd2r4XxHt7:6y8ENRIBmYFj80TRgQ1S64p/UylaPXtX
TLSH T13856F14BFB45996AC4F713734A39523125478C66875386C3AE68723C28BBAD40F9DBCC
VHASH 4abdf506ca74ed8821a3d8de58984c02

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v1.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 0000001c1e1e0908 Perceptual hash used to compare visual similarity of files.
raw md5 577270d5cd63181cc4fa2abbd47ce4a7 Raw MD5 hash of the file contents.
extensions xml (445), png (140), kotlin_builtins (7), so (4), arsc (1), bin (1), dex (1), jks (1), MF (1), prof (1), profm (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types XML (627), PNG (183), unknown (15), ELF (4), DEX (1), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 2025-12-01 15:36:34 UTC Latest timestamp found among files inside the archive.
lowest datetime 2025-12-01 15:36:34 UTC Earliest timestamp found among files inside the archive.
num children 831 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 12 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Requested Permissions (11)

directly call phone numbers Allows the app to call phone numbers without your intervention. This may result in unexpected charges or calls. Note that this doesn\'t allow the app to call emergency numbers. Malicious apps may cost you money by making calls without your confirmation, or dial carrier codes which cause incoming calls to be automatically forwarded to another number. android.permission.CALL_PHONE
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
Dump android.permission.DUMP
find accounts on the device Allows the app to get the list of accounts known by the tablet. This may include any accounts created by applications you have installed. android.permission.GET_ACCOUNTS
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
read your text messages (SMS or MMS) This app can read all SMS (text) messages stored on your tablet. android.permission.READ_SMS
receive text messages (SMS) Allows the app to receive and process SMS messages. This means the app could monitor or delete messages sent to your device without showing them to you. android.permission.RECEIVE_SMS
record audio android.permission.RECORD_AUDIO
send and view SMS messages Allows the app to send SMS messages. This may result in unexpected charges. Malicious apps may cost you money by sending messages without your confirmation. android.permission.SEND_SMS
keep car screen turned on Allows the app to keep the car screen turned on. android.permission.WAKE_LOCK
Write Sms android.permission.WRITE_SMS

Submission Details

Submitted At 2026-03-09
First Submission 2026-03-09
Last Submission 2026-03-09
Stored Until 2026-04-08