Renat icon

Renat__1_.apk

Renat

13.32 MB

Analyzed: 2026-03-03 16:45 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
67/100
Threat scan flagged Debuggable build Modern target SDK
Privacy Permissions & network
95/100
High-risk permissions HTTP URLs found Low data access
79/100
Good
Overall trust

Facts

Threat scan 3/76 flagged, 0 suspicious
Permissions 8 requested
Network strings 2 URLs (1 HTTP, 1 HTTPS)
Target SDK 34
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 3/76 scanners marked this file as malicious.
Found 1 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES
Package Name com.example.localvpnblocker
Version Code 1
Version Name 1.28
Application Name com.example.localvpnblocker.App
Debuggable Yes
Allow Backup No
Min SDK Android 26 (Oreo)
Target SDK Android 34 (Android 14)
Supported ABIs
Universal

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

3 /76
⚠️ Threats Detected
Detected by 3 vendors: BitDefenderFalx (Android.Riskware.TestKey.rA), Google (Detected), Ikarus (Trojan-Spy.AndroidOS.Banker)
Scanned by 76 security vendors
Last scan: 2026-03-03 16:45 UTC
Malicious
3
Suspicious
0
Harmless
0
Undetected
63
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.754
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260303-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.TestKey.rA
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet type-unsupported
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.251
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43724AVA:64.30764
Google malicious
Detected
Engine 1772550085
Gridinsoft undetected
No result reported
Engine 1.0.240.174
Ikarus malicious
Trojan-Spy.AndroidOS.Banker
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.39.58764
K7GW undetected
No result reported
Engine 14.39.58764
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14023
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-03.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1157
Webroot undetected
No result reported
Engine 1.10.0.2
Xcitium undetected
No result reported
Engine 38456
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5555
ZoneAlarm undetected
No result reported
Engine 6.23-113518562
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 2580b8d:2580b8d:feb7c46:feb7c46
tehtris type-unsupported
No result reported

File Signatures

SHA-256 911be270312bdcfbd0c3e55a5381d9ae1fde6051c9e61ff39d72abfb9aba6ba1
MD5 eb919dc1dc613c528a4a9d2e3651c301
SHA-1 6345c122d074069ffb2a9f9d99b958f35fbca1ae
SSDEEP 393216:XTBbHfU48LXGzLHDtHIkH9Ic4C5X87NiIjJeKq:9rU9LXGfHDXd/ZAleKq
TLSH T187E612D7F384A81BC4F38372857653A6450B4C268B83DBC76958763C29BB6D06F4DAC8
VHASH 1b0a581ae936fd1fa080f1e6432d0a88
PERMHASH 8a47bff6d73349fef45e341849c3336249f35d03f32debaf5426de86edcc03dc

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (40%), Java Archive (20%), VYM Mind Map (18.5%), Sweet Home 3D Design (generic) (15.5%), ZIP compressed archive (5.9%) TrID file type guesses with probabilities.
dhash 0000001e1c0f1410 Perceptual hash used to compare visual similarity of files.
raw md5 8f1a2471d97145abba28c9f5c0102298 Raw MD5 hash of the file contents.
extensions xml (639), png (263), version (43), kotlin_builtins (7), dex (4), arsc (1), bin (1), CoroutineExceptionHandler (1), jpg (1), MainDispatcherFactory (1), MF (1), properties (1), RSA (1), SF (1), ttf (1) File extensions found inside the APK and how many of each.
file types XML (639), PNG (263), unknown (62), Java Bytecode (1), JPG (1) Detected embedded file types and their counts.
highest datetime 2026-03-03 20:20:12 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-02-15 14:46:10 UTC Earliest timestamp found among files inside the archive.
num children 966 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 19 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android category: harmless | confidence: 93 | classification: CLEAN | sandbox: Zenbox android

Deep Manifest Analysis

Activity Intents (1)

com.example.localvpnblocker.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (2)

com.example.localvpnblocker.LocalVpnService
Actions
android.net.VpnService android.net.VpnService
com.example.localvpnblocker.YandexWatchAccessibilityService
Actions
android.accessibilityservice.AccessibilityService android.accessibilityservice.AccessibilityService

Receiver Intents (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION

Requested Permissions (8)

Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.FOREGROUND_SERVICE_VPN Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_VPN
android.permission.FOREGROUND_SERVICE_SPECIAL_USE Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_SPECIAL_USE
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. com.example.localvpnblocker.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Activities (7)

com.example.localvpnblocker.MainActivity
com.example.localvpnblocker.PauseAppPickerActivity
com.example.localvpnblocker.TargetAppPickerActivity
com.example.localvpnblocker.LicenseActivity
com.example.localvpnblocker.BlockDelaySettingsActivity
com.example.localvpnblocker.ShieldActivity
com.example.localvpnblocker.LogsMenuActivity

Services (3)

com.example.localvpnblocker.LocalVpnService
com.example.localvpnblocker.OverlayService
com.example.localvpnblocker.YandexWatchAccessibilityService

Broadcast Receivers (1)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (2)

androidx.core.content.FileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-03-03
First Submission 2026-03-03
Last Submission 2026-03-03
Stored Until 2026-04-02