Use apkid https://github.com/rednaga/APKiD to determine if certain packers or obfuscation engines are in use. It will also help determine anti-re code.
Install apkid:
pip install apkid
Usage:
apkid application.apk
Example:
apkid -v NameofAPK.apk
[+] APKiD 2.1.2 :: from RedNaga :: rednaga.io
[*] NameofAPK.apk!classes.dex
|-> anti_debug : Debug.isDebuggerConnected() check
|-> anti_vm : Build.BOARD check, Build.FINGERPRINT check, Build.HARDWARE check, Build.MANUFACTURER check, Build.MODEL check, Build.PRODUCT check, network operator name check, possible Build.SERIAL check, possible VM check
|-> compiler : r8
[*] NameofAPK.apk!classes2.dex
|-> anti_vm : Build.FINGERPRINT check, Build.MANUFACTURER check, Build.MODEL check, Build.PRODUCT check, network operator name check, possible Build.SERIAL check
|-> compiler : r8 without marker (suspicious)