APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
17/100
Threat scan flagged
Privacy
Permissions & network
45/100
High-risk permissions
25/100
High Risk
Overall trust
Facts
Threat scan
22/76 flagged, 0 suspicious
Permissions
11 requested
Network strings
No URL strings detected
Target SDK
31
Certificate
Valid until 2036-03-07 (10 years, suspicious)
Warnings
Threat scan flagged: 22/76 scanners marked this file as malicious.
High-risk permissions detected: android.permission.SYSTEM_ALERT_WINDOW, android.permission.QUERY_ALL_PACKAGES
Package Name
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC
Version Code
1929
Version Name
08.19.29
Application Name
i.app.applicationMain
Debuggable
No
Allow Backup
No
Min SDK
Android 22 (Lollipop)
Target SDK
Android 31 (Android 12)
Supported ABIs
arm64-v8a
armeabi-v7a
x86
x86_64
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: CN
Issuer: DN
Issuer: L
Issuer: O
Issuer: OU
Issuer: ST
Subject: C
Subject: CN
Subject: DN
Subject: L
Subject: O
Subject: OU
Subject: ST
Security Scan
22
⚠️ Threats Detected
Detected by
22 vendors:
AhnLab-V3 (Trojan/Android.Infostealer.1243715), Avast-Mobile (Android:Evo-gen [Trj]), Avira (ANDROID/Stealer.FTVO.Gen)
Malicious
22
Suspicious
0
Harmless
0
Undetected
41
Timeout
4
Failure
0
Scan Providers
ALYac
APEX
AVG
Acronis
AhnLab-V3
Trojan/Android.Infostealer.1243715
Alibaba
Antiy-AVL
Arcabit
Avast
Avast-Mobile
Android:Evo-gen [Trj]
Avira
ANDROID/Stealer.FTVO.Gen
Baidu
BitDefender
BitDefenderFalx
Android.Trojan.SmsSpy.AQT
Bkav
CAT-QuickHeal
CMC
CTX
apk.trojan.ftvo
ClamAV
CrowdStrike
Cylance
Cynet
DeepInstinct
DrWeb
Android.Spy.1391.origin
ESET-NOD32
Android/Spy.Agent.DUU trojan
Elastic
Emsisoft
F-Secure
Malware.ANDROID/Stealer.FTVO.Gen
Fortinet
Android/Agent.JDU!tr
GData
Google
Detected
Gridinsoft
Ikarus
Trojan-Spy.AndroidOS.Agent
Jiangmin
K7AntiVirus
K7GW
Trojan ( 005c18a51 )
Kaspersky
HEUR:Trojan-Spy.AndroidOS.FakeApp.db
Kingsoft
Lionic
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
NANO-Antivirus
Paloalto
Panda
Rising
Spyware.Agent/Android!8.3BE (CLOUD)
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Andr/Xgen4-EF
Symantec
Trojan.Gen.NPE
SymantecMobileInsight
AdLibrary:Generisk
TACHYON
Tencent
Android.Trojan-Spy.Fakeapp.Bdhl
Trapmine
TrellixENS
Artemis!DC365F6F5F30
TrendMicro
TrendMicro-HouseCall
Trustlook
Android.Malware.Spyware
VBA32
VIPRE
Varist
ABTrojan.NUIY-
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Andr/Xgen4-EF
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
0cced7a29c3e4cc50e4ba36fcdc371162d3acc9fc61e30c555f29a6d749cedbf
MD5
acfa0c40a52b50681408cb1ba3e05476
SHA-1
0da39e35b615ff8a554bde5b9744e9298ab25d3b
SSDEEP
786432:uajEZHNGbw18KS9OJM0ZfoPKxZxyGiw1ln:uajE+5F9yM0ZQPOAUbn
TLSH
T15647235AE7884E19C7F7433F527A82A111C78D3CC783DA63852079B8A8339D44D67AF9
VHASH
ad670e4d9f735981037999bc0a2803be
PERMHASH
64eb0da7ee056393d3a9b65bef033a2e33814f3ee5fa8af54724cde4dd8f08d3
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
Magika
File type predicted by Magika (ML-based file type detection).
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Sandbox
Sandbox Verdicts
Zenbox android
Harmless
87% confidence
CLEAN
Deep Manifest Analysis
Activity Intents (1)
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.main
Native Libraries (3)
libfrvjrrfguigrf.vrhfgrf
libfrvjrrfguigrf.vrhfgrf.so
libpl_droidsonroids_gif
libpl_droidsonroids_gif.so
libvrfjhvurf.vrjhgfff
libvrfjhvurf.vrjhgfff.so
Requested Permissions (11)
read phone status and identity
android.permission.READ_PHONE_STATE
have full network access
android.permission.INTERNET
view network connections
android.permission.ACCESS_NETWORK_STATE
access precise location only in the foreground
android.permission.ACCESS_FINE_LOCATION
read the contents of your shared storage
android.permission.READ_EXTERNAL_STORAGE
read call log
android.permission.READ_CALL_LOG
read your contacts
android.permission.READ_CONTACTS
read your text messages (SMS or MMS)
android.permission.READ_SMS
android.permission.QUERY_ALL_PACKAGES
android.permission.QUERY_ALL_PACKAGES
This app can appear on top of other apps
android.permission.SYSTEM_ALERT_WINDOW
android.permission.ACCESS_NOTIFICATION_POLICY
android.permission.ACCESS_NOTIFICATION_POLICY
Activities (15)
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.main
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.L00pi73M
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.t0GOb56X
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.T03E2F6t
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.S590E1ZV
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.L101A5JZ
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.N772E7pX
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.ibC1U6Qx
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.VM2Zf0Vj
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.kj6908zZ
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.Yt19dxlY
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.gnR63SuM
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.vm77X15c
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.rSb335vi
T0e9UH53e.Rg5d1B5z.WBaTy0mP3u7WsC.j875lBmj
Content Providers (2)
i.app.FileProvider
androidx.startup.InitializationProvider
URL Endpoints (2)
Submission Details
Submitted At
First Submission
Last Submission
Stored Until