× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0ca4f8446cf3e190476f32b19b4fe807d7ee80135272164f6f28133888958511
File name: file
Detection ratio: 31 / 56
Analysis date: 2016-01-16 20:07:12 UTC ( 3 years, 4 months ago )
Antivirus Result Update
AegisLab Aulrin 20160116
AhnLab-V3 Android-Trojan/Aulrin.c3c7 20160116
Alibaba A.L.Rog.SelfDel 20160115
Antiy-AVL Trojan[Backdoor:HEUR]/AndroidOS.Aulrin.1 20160117
Avast Android:Aulurin-B [Trj] 20160116
AVG Android/Deng.FXH 20160117
Avira (no cloud) ANDROID/Aulrin.A.20 20160116
AVware Trojan.AndroidOS.Generic.A 20160111
Baidu-International Trojan.Android.Aulrin.B 20160116
BitDefender Android.Trojan.Aulrin.A 20160117
CAT-QuickHeal Android.Aulrin.A1e18 (PUP) 20160116
Comodo UnclassifiedMalware 20160117
Cyren AndroidOS/Aulrin.C.gen!Eldorado 20160117
DrWeb Android.Locker.88 20160117
Emsisoft Android.Trojan.Aulrin.A (B) 20160117
ESET-NOD32 Android/Locker.Y 20160117
F-Secure Trojan:Android/Fakeinst.KD 20160116
Fortinet Android/Aulrin.A!tr.bdr 20160117
GData Android.Trojan.Aulrin.A 20160117
Ikarus Trojan-Ransom.AndroidOS.MonoDroid 20160117
K7GW Trojan ( 004c302e1 ) 20160117
Kaspersky HEUR:Backdoor.AndroidOS.Aulrin.a 20160117
McAfee Artemis!0C6B84416A5F 20160117
McAfee-GW-Edition Artemis!0C6B84416A5F 20160117
eScan Android.Trojan.Aulrin.A 20160117
NANO-Antivirus Trojan.Android.Aulrin.dpceqo 20160117
Qihoo-360 Trojan.Android.Gen 20160117
Sophos AV Andr/Aulrin-A 20160116
Tencent Dos.Backdoor.Aulrin.Gvr 20160117
VIPRE Trojan.AndroidOS.Generic.A 20160117
Zoner Trojan.AndroidOS.Locker.B 20160117
Yandex 20160116
ALYac 20160119
Arcabit 20160117
Bkav 20160116
ByteHero 20160117
ClamAV 20160116
CMC 20160111
F-Prot 20160117
Jiangmin 20160117
K7AntiVirus 20160117
Kingsoft 20160117
Malwarebytes 20160117
Microsoft 20160117
nProtect 20160115
Panda 20160116
Rising 20160117
SUPERAntiSpyware 20160117
Symantec 20160116
TheHacker 20160116
TotalDefense 20160117
TrendMicro 20160117
TrendMicro-HouseCall 20160117
VBA32 20160115
ViRobot 20160117
Zillya 20160116
The file being studied is Android related! APK Android file more specifically. The application's main package name is VKAuto.VKAuto. The internal version number of the application is 4. The displayed version string of the application is 4.5. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.CONTROL_LOCATION_UPDATES (control location update notifications)
android.permission.ACCESS_MOCK_LOCATION (mock location sources for testing)
android.permission.ACCESS_LOCATION_EXTRA_COMMANDS (access extra location provider commands)
android.permission.CHANGE_COMPONENT_ENABLED_STATE (enable or disable application components)
android.permission.BIND_DEVICE_ADMIN (interact with device admin)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.MODIFY_PHONE_STATE (modify phone status)
android.permission.INSTALL_PACKAGES (directly install applications)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Activities
z.core.AdminActivity
z.core.CasinoActivity
z.core.CustomActivityBankApp
z.core.CustomActivityBrowser
z.core.CustomActivityGoogleCC
z.core.CustomActivityRunScript
z.core.LockActivity
z.core.AppActivity
xamarin.media.MediaPickerActivity
Services
z.core.AdminService
z.core.LockService
z.core.RunService
Receivers
z.core.AdminReceiver
z.core.OnAdminBootHandler
z.core.OnLockBootHandler
z.core.OnBootHandler
z.core.SMSReciever
VKAuto.VKAuto.SMSReceiver
Providers
mono.MonoRuntimeProvider
Activity-related intent filters
z.core.AppActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters

actions: android.intent.action.BOOT_COMPLETED
z.core.AdminReceiver
actions: android.app.action.DEVICE_ADMIN_ENABLED
z.core.OnLockBootHandler
actions: android.intent.action.BOOT_COMPLETED
z.core.OnAdminBootHandler
actions: android.intent.action.BOOT_COMPLETED
VKAuto.VKAuto.SMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
z.core.OnBootHandler
actions: android.intent.action.BOOT_COMPLETED
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
18
Uncompressed size
4862979
Highest datetime
2015-02-07 21:15:32
Lowest datetime
2015-02-07 21:15:18
Contained files by extension
xml
7
so
3
dex
1
MF
1
RSA
1
SF
1
png
1
Contained files by type
XML
7
unknown
6
ELF
3
DEX
1
PNG
1
File identification
MD5 0c6b84416a5fb880c774af5ab42d6951
SHA1 5149d308552865cdd50146d5f61ef2729202634a
SHA256 0ca4f8446cf3e190476f32b19b4fe807d7ee80135272164f6f28133888958511
ssdeep
49152:LqYmD8QTQx9YQPT8u7TUaiZyJvmAhw44SQWaySKdKH1ZRZh+xMlqChrfMyf:eYmD819b78KUFZ8vE47NaFKcV3yxM5Mc

File size 2.7 MB ( 2880690 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-08-16 07:00:39 UTC ( 3 years, 9 months ago )
Last submission 2015-08-16 07:00:39 UTC ( 3 years, 9 months ago )
File names file
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!