HEYSO 𝐇𝐀𝐂𝐊_V3 icon

HEYSO______V3__5___1_.apk

HEYSO 𝐇𝐀𝐂𝐊_V3

7.43 MB

Analyzed: 2026-04-03 14:36 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
73/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
98/100
High-risk permissions AllowBackup enabled Low data access
84/100
Good
Overall trust

Facts

Threat scan 3/76 flagged, 0 suspicious
Permissions 2 requested
Network strings 1 URLs (0 HTTP, 1 HTTPS)
Target SDK 34
Certificate Valid until 2035-07-17 (9 years, suspicious)

Warnings

Threat scan flagged: 3/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW
AllowBackup is enabled.
Package Name HEYSO.PRO.PANEL
Version Code 1
Version Name 1.0
Application Name KOHLI.HACK.HACK.SketchApplication
Debuggable No
Allow Backup Yes
Min SDK Android 21 (Lollipop)
Target SDK Android 34 (Android 14)
Supported ABIs
Universal

Certificate & Signer

Valid From 2008-02-29 01:33:46
Valid To 2035-07-17 01:33:46
Serial Number 936eacbe07f201df
Thumbprint 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

3 /76
⚠️ Threats Detected
Detected by 3 vendors: AhnLab-V3 (AppCare/Android.Gmt.1324702), BitDefenderFalx (Android.Riskware.TestKey.rA), Ikarus (PUA.AndroidOS.FakeApp)
Scanned by 76 security vendors
Last scan: 2026-04-03 14:36 UTC
Malicious
3
Suspicious
0
Harmless
0
Undetected
64
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.765
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 malicious
AppCare/Android.Gmt.1324702
Engine 3.29.3.10609
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260402-00
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.TestKey.rA
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.255
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.44092AVA:64.30958
Google undetected
No result reported
Engine 1775223048
Gridinsoft undetected
No result reported
Engine 1.0.242.174
Ikarus malicious
PUA.AndroidOS.FakeApp
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.44.59087
K7GW undetected
No result reported
Engine 14.44.59089
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.214
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14370
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26020.3
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.6.2.19
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.4.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-04-03.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.11.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1180
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38539
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5574
ZoneAlarm undetected
No result reported
Engine 6.23-113519372
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 698d98c:698d98c:fd748a7:fd748a7
tehtris type-unsupported
No result reported
Engine v0.1.4

File Signatures

SHA-256 2c0ea31b2b7a5c029f7810603e8477366c1be61fffdd14140fd77ec67b15519b
MD5 ed5db4d2324c3b99588bd94089952a42
SHA-1 c95d1b24c00686f5418c4ea13adc2bb9021d9f9e
SSDEEP 196608:Th5IORSNd7NdPUlzNdUNdcJc/mdczD+Nd24YWNd/:NTrHdcu
TLSH T1C0763353F6F9C873EE532536623412B578E173540ABC4139810372D8291E9EAE73EBA7
VHASH 81334fad82e1f3cb48184b54f3b6621b
PERMHASH 56bb07959bea434ca430099fac8db2eb2079f9a2eb8ef2cef50a6a57e842a5fc

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (60.6%), Java Archive (30.3%), ZIP compressed archive (8.9%) TrID file type guesses with probabilities.
dhash 000000000c0d0000 Perceptual hash used to compare visual similarity of files.
raw md5 2c73398a3ae03290f457131cff7ff5ae Raw MD5 hash of the file contents.
extensions png (31), xml (9), dex (7), ttf (4), arsc (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types PNG (31), XML (9), unknown (8), DEX (7) Detected embedded file types and their counts.
highest datetime 2025-12-17 20:37:12 UTC Latest timestamp found among files inside the archive.
lowest datetime 1980-01-01 05:30:00 UTC Earliest timestamp found among files inside the archive.
num children 55 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 7.8 MB Estimated total size of all files after extraction.

Sandbox

Sandbox Verdicts

Zenbox android
Harmless 94% confidence CLEAN

Deep Manifest Analysis

Activity Intents (1)

KOHLI.HACK.HACK.LoginActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Requested Permissions (2)

control vibration Allows the app to control the vibrator. android.permission.VIBRATE
This app can appear on top of other apps This app can appear on top of other apps or other parts of the screen. This may interfere with normal app usage and change the way that other apps appear. android.permission.SYSTEM_ALERT_WINDOW

Activities (4)

KOHLI.HACK.HACK.MainActivity
KOHLI.HACK.HACK.LoginActivity
KOHLI.HACK.HACK.PredictActivity
KOHLI.HACK.HACK.DebugActivity

URL Endpoints (1)

Submission Details

Submitted At 2026-04-03
First Submission 2026-04-03
Last Submission 2026-04-03
Stored Until 2026-05-03