Coinhub icon

Coinhub.apk

Coinhub

4.50 MB

Analyzed: 2026-02-17 06:58 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
70/100
Threat scan flagged Outdated target SDK
Privacy Permissions & network
78/100
High-risk permissions
74/100
Caution
Overall trust

Facts

Threat scan 3/76 flagged, 0 suspicious
Permissions 17 requested
Network strings 12 URLs (0 HTTP, 12 HTTPS)
Target SDK 28
Certificate Valid until 2124-09-24 (99 years, suspicious)

Warnings

Threat scan flagged: 3/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.REQUEST_INSTALL_PACKAGES
Package Name plus.Coinhubh5
Version Code 100
Version Name 1.0
Application Name io.dcloud.application.DCloudApplication
Debuggable No
Allow Backup No
Min SDK Android 19 (KitKat)
Target SDK Android 28 (Pie)
Supported ABIs
arm64-v8a armeabi-v7a x86

Certificate & Signer

Valid From 2024-10-18 05:09:27
Valid To 2124-09-24 05:09:27
Serial Number c8759cb
Thumbprint e12e60a5f226da304532105f7c7595f389b4c663
Issuer: C CN
Issuer: CN Coinhubh5
Issuer: DN C:CN, CN:Coinhubh5, O:Coinhubh5, OU:IT
Issuer: O Coinhubh5
Issuer: OU IT
Subject: C CN
Subject: CN Coinhubh5
Subject: DN C:CN, CN:Coinhubh5, O:Coinhubh5, OU:IT
Subject: O Coinhubh5
Subject: OU IT

Security Scan

3 /76
⚠️ Threats Detected
Detected by 3 vendors: BitDefenderFalx (Android.Riskware.Agent.ODM), Google (Detected), Ikarus (Trojan.AndroidOS.Agent)
Scanned by 76 security vendors
Last scan: 2026-01-30 07:21 UTC
Malicious
3
Suspicious
0
Harmless
0
Undetected
64
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.741
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260128-04
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx malicious
Android.Riskware.Agent.ODM
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.74.11120
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.246
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43359AVA:64.30575
Google malicious
Detected
Engine 1769752830
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus malicious
Trojan.AndroidOS.Agent
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.32.58436
K7GW undetected
No result reported
Engine 14.32.58436
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.206
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13486
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.25110.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-01-30.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.8.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.0
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1134
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38371
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5534
ZoneAlarm undetected
No result reported
Engine 6.22-112233517
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine fb1beb6:fb1beb6:611137d:611137d
tehtris type-unsupported
No result reported

File Signatures

SHA-256 75cbc4ccdb2423eece5fb217cbc991307b0d749e9f6eba64b3367c365ae6da6f
MD5 ff334a14f0371891f83b6db24254e1e2
SHA-1 e89204fc8502f8cb07db3427e48172f89d3c199b
SSDEEP 98304:8sPBczsR8Lc14+PAKCNcqUa0/6pIrxQZRBpzwUAhvCTOFmu+4ES+iDS:rA28AUUl/6qdm2lCTP
TLSH T158261297E70AEE26E5B3C236937A465B561A0C9C8353F3831B45B56C0DB7AC08785FC8
VHASH b7744510c16245bf68b62d7342bb3a47
PERMHASH e03374b00a6fae7b5fbcb5165d64bf6e379ae6e3eee6727b25b443ef11df92a0

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 000000080e0d0408 Perceptual hash used to compare visual similarity of files.
raw md5 fc47cefdff9e782a3eef6ee61f23336d Raw MD5 hash of the file contents.
extensions png (356), xml (306), so (12), json (4), gif (3), js (3), dex (2), html (2), arsc (1), AutoDiscoverable (1), gz (1), MessageBodyReader (1), MessageBodyWriter (1), MF (1), ogg (1), Providers (1), RSA (1), SF (1), ttf (1), txt (1) File extensions found inside the APK and how many of each.
file types PNG (356), XML (306), unknown (16), ELF (12), GIF (3), HTML (2), JSON (2), DEX (1), JavaScript (1), OGG (1) Detected embedded file types and their counts.
highest datetime 2024-10-18 13:14:46 UTC Latest timestamp found among files inside the archive.
lowest datetime 2024-10-18 13:14:38 UTC Earliest timestamp found among files inside the archive.
num children 700 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 9.3 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

io.dcloud.PandoraEntry
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
View Activity Action: Display the data to the user. android.intent.action.VIEW
Categories
android.intent.category.LAUNCHER android.intent.category.DEFAULT android.intent.category.BROWSABLE

Native Libraries (4)

lib39285EFA lib39285EFA.so
Breakpad Crash Reporter Crash reporting library that captures diagnostic minidumps. libbreakpad-core.so
libdcblur libdcblur.so
libpl_droidsonroids_gif libpl_droidsonroids_gif.so

Requested Permissions (19)

modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
android.permission.READ_MEDIA_IMAGES Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_IMAGES
android.permission.READ_MEDIA_VIDEO Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VIDEO
android.permission.READ_MEDIA_VISUAL_USER_SELECTED Custom app or vendor permission (not publicly documented). android.permission.READ_MEDIA_VISUAL_USER_SELECTED
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
App badge update Allows the app to update the launcher icon badge count on Huawei launchers. com.huawei.android.launcher.permission.CHANGE_BADGE
App badge update Allows the app to update the launcher icon badge count on launcher launchers. com.vivo.notification.permission.BADGE_ICON
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
com.asus.msa.SupplementaryDID.ACCESS
view Wi-Fi connections Allows the app to view information about Wi-Fi networking, such as whether Wi-Fi is enabled and name of connected Wi-Fi devices. android.permission.ACCESS_WIFI_STATE
Install Packages android.permission.INSTALL_PACKAGES
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES
change network connectivity Allows the app to change the state of network connectivity. android.permission.CHANGE_NETWORK_STATE
Mount Unmount Filesystems android.permission.MOUNT_UNMOUNT_FILESYSTEMS
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
take pictures and videos This app can take pictures and record videos using the camera while the app is in use. android.permission.CAMERA
android.permission.REQUEST_INSTALL_PACKAGES Custom app or vendor permission (not publicly documented). android.permission.REQUEST_INSTALL_PACKAGES

Activities (10)

io.dcloud.PandoraEntry
io.dcloud.PandoraEntryActivity
io.dcloud.feature.nativeObj.photoview.PhotoActivity
io.dcloud.WebAppActivity
io.dcloud.ProcessMediator
io.dcloud.WebviewActivity
com.dmcbig.mediapicker.PickerActivity
com.dmcbig.mediapicker.PreviewActivity
io.dcloud.feature.gallery.imageedit.IMGEditActivity
io.dcloud.sdk.activity.WebViewActivity

Services (1)

io.dcloud.sdk.base.service.DownloadService

Content Providers (2)

io.dcloud.common.util.DCloud_FileProvider
io.dcloud.sdk.base.service.provider.DCloudAdFileProvider

Submission Details

Submitted At 2026-02-17
First Submission 2026-02-17
Last Submission 2026-02-17
Stored Until 2026-03-19