Is your machine at risk?
While bypassing Bouncer detection is not impossible, it is sufficient enough to keep most malware creators at bay.
However, the authors of Android.Xiny.19.origin were much more ambitious.
After the crafted image is downloaded, the Trojan extracts an APK from it by using a special algorithm.
It then loads the malicious code in the devices memory by using the DexClassLoader Android function.
However, when applying a decryption algorithm to it, they could recover the APK.
Source:Drweb
Read More
source: www.techworm.net