Fake_Ninja_Lite.apk

353.90 KB

Analyzed: 2026-05-04 07:56 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
14/100
Threat scan flagged Debuggable build Modern target SDK
Privacy Permissions & network
74/100
High-risk permissions AllowBackup enabled
24/100
High Risk
Overall trust

Facts

Threat scan 21/75 flagged, 0 suspicious
Permissions 15 requested
Network strings No URL strings detected
Target SDK 36
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 21/75 scanners marked this file as malicious.
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES, android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Package Name com.fakeninjalite
Version Code 1
Version Name 1.0
Debuggable Yes
Allow Backup Yes
Min SDK Android 21 (Lollipop)
Target SDK Android 36 (Unknown)
Supported ABIs
Universal

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

21 /75
⚠️ Threats Detected
Detected by 21 vendors: AVG (Android:Evo-gen [Trj]), Alibaba (TrojanSpy:Android/Cerberus.eea3b2f6), Avast (Android:Evo-gen [Trj])
Scanned by 75 security vendors
Last scan: 2026-04-26 03:20 UTC
Malicious
21
Suspicious
0
Harmless
0
Undetected
45
Timeout
0
Failure
0

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.773
AVG malicious
Android:Evo-gen [Trj]
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.30.0.10666
Alibaba malicious
TrojanSpy:Android/Cerberus.eea3b2f6
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast malicious
Android:Evo-gen [Trj]
Engine 23.9.8494.0
Avast-Mobile malicious
Android:Evo-gen [Trj]
Engine 260425-02
Avira malicious
ANDROID/Robtes.GEN1.Gen
Engine 8.3.3.24
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Agent.aDRQB
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet malicious
Malicious (score: 99)
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb malicious
Tool.NPMod.3
Engine 7.0.75.2070
ESET-NOD32 malicious
Android/Spy.Cerberus.AP trojan
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.257
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure malicious
Malware.ANDROID/Robtes.GEN1.Gen
Engine 18.10.1547.307
Fortinet malicious
Adware/Cerberus!Android
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44324AVA:64.31117
Google malicious
Detected
Engine 1777168868
Gridinsoft undetected
No result reported
Engine 1.0.244.174
Ikarus malicious
PUA.AndroidOS.Obfuse
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.48.59313
K7GW malicious
Spyware ( 0058c6121 )
Engine 14.48.59313
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.231
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14532
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26030.3008
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising malicious
Spyware.Cerberus/Android!8.10F03 (CLOUD)
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec malicious
Trojan.Gen.NPE
Engine 1.22.0.0
SymantecMobileInsight malicious
AdLibrary:Generisk
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-04-23.02
Tencent malicious
Android.Trojan.Robtes.Rgil
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.11.0
TrellixENS malicious
Artemis!AC3C745EE315
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook malicious
Android.Malware.General
Engine 1.0
VBA32 undetected
No result reported
Engine 5.6.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist malicious
ABApplication.OH
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1194
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38596
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5588
ZoneAlarm undetected
No result reported
Engine 6.24-114820515
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine dbb7acd:dbb7acd:a9d2355:a9d2355
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 65b90c665840fac43a4e9f540c84037e24b4303ca9cfbc50c2788af705131a3b
MD5 ac3c745ee3154e37eba9bc63eb4c2c84
SHA-1 c909df82ca8f18b815d5cf961dac030069a53fe1
SSDEEP 6144:tkskdG8RYyr5GWPzDy+8Kk0vVJHrvBDurxUBiEG1EKUno5MKSprtV:tksf8r1HPC+KgJNfBiEYQnQiV
TLSH T164741232EE64D24BD63BC5B37E92916960BA82E7158CB50F7207E4912CF3FE446C518E
VHASH 2a5df052fcb08f16b73181fb2aa491f8
PERMHASH 80497ea7757cd68f8a1d483a1ad0f3c3a35b5d35a3212e139a4e532fca9d6284

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Java Archive (77.1%), ZIP compressed archive (22.8%) TrID file type guesses with probabilities.
dhash 0000001819000000 Perceptual hash used to compare visual similarity of files.
raw md5 d7a17c01403d973348038bebd9fa9e2f Raw MD5 hash of the file contents.
extensions xml (22), arsc (1), dex (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types XML (22), unknown (4), DEX (1) Detected embedded file types and their counts.
highest datetime 2026-04-24 10:42:42 UTC Latest timestamp found among files inside the archive.
lowest datetime 2026-04-24 10:40:30 UTC Earliest timestamp found among files inside the archive.
num children 27 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 1.9 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.fakeninjalite.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (1)

com.fakeninjalite.FakeNinjaLite8
Actions
android.net.VpnService android.net.VpnService

Requested Permissions (15)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
Foreground service Allows the app to run a foreground service. android.permission.FOREGROUND_SERVICE
android.permission.FOREGROUND_SERVICE_DATA_SYNC Custom app or vendor permission (not publicly documented). android.permission.FOREGROUND_SERVICE_DATA_SYNC
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
android.permission.QUERY_ALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.QUERY_ALL_PACKAGES
android.permission.POST_NOTIFICATIONS Custom app or vendor permission (not publicly documented). android.permission.POST_NOTIFICATIONS
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
android.permission.READ_MEDIA_IMAGES Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_VIDEO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_AUDIO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_AUDIO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VISUAL_USER_SELECTED
android.permission.MANAGE_EXTERNAL_STORAGE Custom app or vendor permission (not publicly documented). android.permission.MANAGE_EXTERNAL_STORAGE

Activities (2)

com.fakeninjalite.MainActivity
com.fakeninjalite.FakeNinjaLite9

Services (2)

com.fakeninjalite.FakeNinjaLite3
com.fakeninjalite.FakeNinjaLite8

Submission Details

Submitted At 2026-05-04
First Submission 2026-05-04
Last Submission 2026-05-04
Stored Until 2026-06-03