APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
14/100
Threat scan flagged
Debuggable build
Modern target SDK
Privacy
Permissions & network
74/100
High-risk permissions
AllowBackup enabled
24/100
High Risk
Overall trust
Facts
Threat scan
21/75 flagged, 0 suspicious
Permissions
15 requested
Network strings
No URL strings detected
Target SDK
36
Certificate
Valid until 2035-07-17 (9 years, suspicious)
Warnings
Threat scan flagged: 21/75 scanners marked this file as malicious.
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES, android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Package Name
com.fakeninjalite
Version Code
1
Version Name
1.0
Debuggable
Yes
Allow Backup
Yes
Min SDK
Android 21 (Lollipop)
Target SDK
Android 36 (Unknown)
Supported ABIs
Universal
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: CN
Issuer: DN
Issuer: L
Issuer: O
Issuer: OU
Issuer: ST
Issuer: email
Subject: C
Subject: CN
Subject: DN
Subject: L
Subject: O
Subject: OU
Subject: ST
Subject: email
Security Scan
21
⚠️ Threats Detected
Detected by
21 vendors:
AVG (Android:Evo-gen [Trj]), Alibaba (TrojanSpy:Android/Cerberus.eea3b2f6), Avast (Android:Evo-gen [Trj])
Malicious
21
Suspicious
0
Harmless
0
Undetected
45
Timeout
0
Failure
0
Scan Providers
ALYac
APEX
AVG
Android:Evo-gen [Trj]
Acronis
AhnLab-V3
Alibaba
TrojanSpy:Android/Cerberus.eea3b2f6
Antiy-AVL
Arcabit
Avast
Android:Evo-gen [Trj]
Avast-Mobile
Android:Evo-gen [Trj]
Avira
ANDROID/Robtes.GEN1.Gen
BitDefender
BitDefenderFalx
Android.Riskware.Agent.aDRQB
Bkav
CAT-QuickHeal
CMC
CTX
ClamAV
CrowdStrike
Cylance
Cynet
Malicious (score: 99)
DeepInstinct
DrWeb
Tool.NPMod.3
ESET-NOD32
Android/Spy.Cerberus.AP trojan
Elastic
Emsisoft
F-Secure
Malware.ANDROID/Robtes.GEN1.Gen
Fortinet
Adware/Cerberus!Android
GData
Google
Detected
Gridinsoft
Ikarus
PUA.AndroidOS.Obfuse
Jiangmin
K7AntiVirus
K7GW
Spyware ( 0058c6121 )
Kaspersky
Kingsoft
Lionic
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
NANO-Antivirus
Paloalto
Panda
Rising
Spyware.Cerberus/Android!8.10F03 (CLOUD)
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Symantec
Trojan.Gen.NPE
SymantecMobileInsight
AdLibrary:Generisk
TACHYON
Tencent
Android.Trojan.Robtes.Rgil
Trapmine
TrellixENS
Artemis!AC3C745EE315
TrendMicro
TrendMicro-HouseCall
Trustlook
Android.Malware.General
VBA32
VIPRE
Varist
ABApplication.OH
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
65b90c665840fac43a4e9f540c84037e24b4303ca9cfbc50c2788af705131a3b
MD5
ac3c745ee3154e37eba9bc63eb4c2c84
SHA-1
c909df82ca8f18b815d5cf961dac030069a53fe1
SSDEEP
6144:tkskdG8RYyr5GWPzDy+8Kk0vVJHrvBDurxUBiEG1EKUno5MKSprtV:tksf8r1HPC+KgJNfBiEYQnQiV
TLSH
T164741232EE64D24BD63BC5B37E92916960BA82E7158CB50F7207E4912CF3FE446C518E
VHASH
2a5df052fcb08f16b73181fb2aa491f8
PERMHASH
80497ea7757cd68f8a1d483a1ad0f3c3a35b5d35a3212e139a4e532fca9d6284
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
Magika
File type predicted by Magika (ML-based file type detection).
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Deep Manifest Analysis
Activity Intents (1)
com.fakeninjalite.MainActivity
Service Intents (1)
com.fakeninjalite.FakeNinjaLite8
Requested Permissions (15)
have full network access
android.permission.INTERNET
view network connections
android.permission.ACCESS_NETWORK_STATE
Foreground service
android.permission.FOREGROUND_SERVICE
android.permission.FOREGROUND_SERVICE_DATA_SYNC
android.permission.FOREGROUND_SERVICE_DATA_SYNC
This app can appear on top of other apps
android.permission.SYSTEM_ALERT_WINDOW
run at startup
android.permission.RECEIVE_BOOT_COMPLETED
android.permission.QUERY_ALL_PACKAGES
android.permission.QUERY_ALL_PACKAGES
android.permission.POST_NOTIFICATIONS
android.permission.POST_NOTIFICATIONS
modify or delete the contents of your shared storage
android.permission.WRITE_EXTERNAL_STORAGE
read the contents of your shared storage
android.permission.READ_EXTERNAL_STORAGE
android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_AUDIO
android.permission.READ_MEDIA_AUDIO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED
android.permission.READ_MEDIA_VISUAL_USER_SELECTED
android.permission.MANAGE_EXTERNAL_STORAGE
android.permission.MANAGE_EXTERNAL_STORAGE
Activities (2)
com.fakeninjalite.MainActivity
com.fakeninjalite.FakeNinjaLite9
Services (2)
com.fakeninjalite.FakeNinjaLite3
com.fakeninjalite.FakeNinjaLite8
Submission Details
Submitted At
First Submission
Last Submission
Stored Until