APK Security & Privacy Score
Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.
Security
Scan-weighted
41/100
Threat scan flagged
Modern target SDK
Privacy
Permissions & network
84/100
AllowBackup enabled
55/100
Caution
Overall trust
Facts
Threat scan
11/76 flagged, 0 suspicious
Permissions
4 requested
Network strings
7 URLs (0 HTTP, 7 HTTPS)
Target SDK
36
Certificate
Valid until 2035-07-17 (9 years, suspicious)
Warnings
Threat scan flagged: 11/76 scanners marked this file as malicious.
AllowBackup is enabled.
Package Name
com.growrlh848.leepecj384
Version Code
92
Version Name
101.100.92
Debuggable
No
Allow Backup
Yes
Min SDK
Android 24 (Nougat)
Target SDK
Android 36 (Unknown)
Supported ABIs
Universal
Certificate & Signer
Valid From
Valid To
Serial Number
Thumbprint
Issuer: C
Issuer: CN
Issuer: DN
Issuer: L
Issuer: O
Issuer: OU
Issuer: ST
Issuer: email
Subject: C
Subject: CN
Subject: DN
Subject: L
Subject: O
Subject: OU
Subject: ST
Subject: email
Security Scan
11
⚠️ Threats Detected
Detected by
11 vendors:
AhnLab-V3 (Trojan/Android.FakeInst.1299224), Avast-Mobile (Android:Evo-gen [Trj]), Avira (ANDROID/Bankbot.FUBC.Gen)
Malicious
11
Suspicious
0
Harmless
0
Undetected
56
Timeout
0
Failure
0
Scan Providers
ALYac
APEX
AVG
Acronis
AhnLab-V3
Trojan/Android.FakeInst.1299224
Alibaba
Antiy-AVL
Arcabit
Avast
Avast-Mobile
Android:Evo-gen [Trj]
Avira
ANDROID/Bankbot.FUBC.Gen
Baidu
BitDefender
BitDefenderFalx
Android.Riskware.TestKey.rA
Bkav
CAT-QuickHeal
CMC
CTX
ClamAV
CrowdStrike
Cylance
Cynet
Malicious (score: 99)
DeepInstinct
DrWeb
ESET-NOD32
Android/TrojanSMS.FakeInst.AAE trojan
Elastic
Emsisoft
F-Secure
Malware.ANDROID/Bankbot.FUBC.Gen
Fortinet
GData
Google
Detected
Gridinsoft
Ikarus
Trojan-SMS.AndroidOS.FakeInst
Jiangmin
K7AntiVirus
K7GW
Kaspersky
HEUR:Trojan-SMS.AndroidOS.EvilInst.v
Kingsoft
Lionic
Malwarebytes
MaxSecure
McAfeeD
MicroWorld-eScan
Microsoft
NANO-Antivirus
Paloalto
Panda
Rising
SUPERAntiSpyware
Sangfor
SentinelOne
Skyhigh
Sophos
Symantec
SymantecMobileInsight
TACHYON
Tencent
a.expense.fakeinstall.bs
Trapmine
TrellixENS
TrendMicro
TrendMicro-HouseCall
Trustlook
VBA32
VIPRE
Varist
ViRobot
VirIT
Webroot
Xcitium
Yandex
Zillya
ZoneAlarm
Zoner
alibabacloud
huorong
tehtris
File Signatures
SHA-256
c9e43eb84f7b1bedb97ca007710d6b2d1c6834d191fbdae3f5d792354f9a2929
MD5
b0a35f75299c63a2f8131d6156167165
SHA-1
ca6259b866d73f94c85bffb161186d6423c3bc64
SSDEEP
49152:05udfkqTLnCELKDFFV+eMQY+0BEV5AV7PgMdwRO8ftRruno:05ifhLeDfYenaEK+O8ftRruno
TLSH
T161D5BF86FB58D92FC8773432096A533166978D168E839783A9443F1C787B6D80F9DBC8
VHASH
a771f270148035a3ef99e6965690c1da
PERMHASH
260751e62cec00982a194223cb5bff97e405485add506278a2ea103c2a098cba
File Intelligence
Type Description
Human-friendly file type name based on multiple detection methods.
Type Extension
Most likely file extension inferred from the content.
Type Tag
Primary type tag assigned by the classifier.
Type Tags
Additional type tags that describe the file content.
Magic
File signature result from magic bytes inspection.
Magika
File type predicted by Magika (ML-based file type detection).
TrID
TrID file type guesses with probabilities.
dhash
Perceptual hash used to compare visual similarity of files.
raw md5
Raw MD5 hash of the file contents.
extensions
File extensions found inside the APK and how many of each.
file types
Detected embedded file types and their counts.
highest datetime
Latest timestamp found among files inside the archive.
lowest datetime
Earliest timestamp found among files inside the archive.
num children
Number of files contained within the archive.
type
Container type detected for the analyzed file.
uncompressed size
Estimated total size of all files after extraction.
Deep Manifest Analysis
Activity Intents (1)
com.growrlh848.leepecj384.MainActivity
Receiver Intents (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Requested Permissions (4)
have full network access
android.permission.INTERNET
send and view SMS messages
android.permission.SEND_SMS
directly call phone numbers
android.permission.CALL_PHONE
Dynamic receiver access
com.growrlh848.leepecj384.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION
Uses Features (1)
Telephony
android.hardware.telephony
Activities (1)
com.growrlh848.leepecj384.MainActivity
Broadcast Receivers (1)
Profile installer
androidx.profileinstaller.ProfileInstallReceiver
Content Providers (1)
androidx.startup.InitializationProvider
URL Endpoints (7)
Submission Details
Submitted At
First Submission
Last Submission
Stored Until