Use apkid https://github.com/rednaga/APKiD to determine if certain packers or obfuscation engines are in use. It will also help determine anti-re code.

Install apkid:

pip install apkid

Usage:

apkid application.apk

Example:

apkid -v NameofAPK.apk
[+] APKiD 2.1.2 :: from RedNaga :: rednaga.io
[*] NameofAPK.apk!classes.dex
 |-> anti_debug : Debug.isDebuggerConnected() check
 |-> anti_vm : Build.BOARD check, Build.FINGERPRINT check, Build.HARDWARE check, Build.MANUFACTURER check, Build.MODEL check, Build.PRODUCT check, network operator name check, possible Build.SERIAL check, possible VM check
 |-> compiler : r8
[*] NameofAPK.apk!classes2.dex
 |-> anti_vm : Build.FINGERPRINT check, Build.MANUFACTURER check, Build.MODEL check, Build.PRODUCT check, network operator name check, possible Build.SERIAL check
 |-> compiler : r8 without marker (suspicious)