× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 11e6ad80c1949a5f21af70ebd451b17334d7e077e7bc79383bf9fbd0e1572c90
File name: 11e6ad80c1949a5f21af70ebd451b17334d7e077e7bc79383bf9fbd0e1572c90.apk
Detection ratio: 36 / 62
Analysis date: 2017-07-12 12:29:10 UTC ( 1 year, 4 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.AndroRAT.E 20170712
AegisLab Troj.Spy.Androidos!c 20170712
AhnLab-V3 Android-Trojan/Sandrorat.2523a 20170712
Alibaba A.H.Pay.Erop.ZZK 20170712
Antiy-AVL Trojan[Spy]/Android.Sandr 20170712
Arcabit Android.Trojan.AndroRAT.E 20170712
Avast Android:DroidJack-A [Trj] 20170712
AVG Android:DroidJack-A [Trj] 20170712
Avira (no cloud) ANDROID/Spy.Kasandra.E.Gen 20170712
Baidu Android.Trojan.Kasandra.c 20170712
BitDefender Android.Trojan.AndroRAT.E 20170712
CAT-QuickHeal Android.Sandr.A 20170712
Cyren AndroidOS/Sandr.A.gen!Eldorado 20170712
DrWeb Android.Spy.178.origin 20170712
Emsisoft Android.Trojan.AndroRAT.E (B) 20170712
ESET-NOD32 a variant of Android/Spy.Kasandra.A 20170712
F-Secure Trojan:Android/AndroRat.K 20170712
Fortinet Android/Sandr.C!tr 20170629
GData Android.Trojan.AndroRAT.E 20170712
Ikarus Trojan-Spy.AndroidOS.Kasandra 20170712
Kaspersky HEUR:Trojan-Spy.AndroidOS.Sandr.a 20170712
MAX malware (ai score=81) 20170712
McAfee Artemis!704CBEEF9E5F 20170712
McAfee-GW-Edition Artemis!Trojan 20170712
eScan Android.Trojan.AndroRAT.E 20170712
NANO-Antivirus Trojan.Android.Zerat.dekxmy 20170712
Qihoo-360 Trojan.Android.Gen 20170712
Rising Spyware.Sandr/Android!8.7EC (cloud:NPT7fr4RJvT) 20170712
Sophos AV Andr/SandRat-B 20170712
Symantec Trojan.Gen.2 20170712
Symantec Mobile Insight Trojan:Sandorat 20170712
Tencent SH.!Android.MExtra.Gen.16dfa 20170712
Trustlook Android.Malware.Trojan 20170712
WhiteArmor Malware.HighConfidence 20170706
ZoneAlarm by Check Point HEUR:Trojan-Spy.AndroidOS.Sandr.a 20170712
Zoner Trojan.AndroidOS.AndroRAT.A 20170712
ALYac 20170712
AVware 20170712
Bkav 20170712
ClamAV 20170712
CMC 20170712
Comodo 20170712
CrowdStrike Falcon (ML) 20170420
Cylance 20170712
Endgame 20170706
F-Prot 20170712
Sophos ML 20170607
Jiangmin 20170712
K7AntiVirus 20170712
K7GW 20170712
Kingsoft 20170712
Malwarebytes 20170712
Microsoft 20170712
nProtect 20170712
Palo Alto Networks (Known Signatures) 20170712
Panda 20170712
SentinelOne (Static ML) 20170516
SUPERAntiSpyware 20170712
TheHacker 20170709
TotalDefense 20170712
TrendMicro 20170712
TrendMicro-HouseCall 20170712
VBA32 20170712
VIPRE 20170712
ViRobot 20170712
Webroot 20170712
Yandex 20170712
Zillya 20170712
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.droidjack.server. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECORD_AUDIO (record audio)
android.permission.READ_CONTACTS (read contact data)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
net.droidjack.server.MainActivity
net.droidjack.server.CamSnap
net.droidjack.server.VideoCap
Services
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
Receivers
net.droidjack.server.Connector
net.droidjack.server.CallListener
Activity-related intent filters
net.droidjack.server.CamSnap
actions: android.intent.action.CAMSNAP
categories: android.intent.category.DEFAULT
net.droidjack.server.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
net.droidjack.server.VideoCap
actions: android.intent.action.VIDEOCAP
categories: android.intent.category.DEFAULT
Receiver-related intent filters
net.droidjack.server.Connector
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BOOT_COMPLETED
net.droidjack.server.CallListener
actions: android.intent.action.PHONE_STATE
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
465320
Highest datetime
2015-12-06 22:04:34
Lowest datetime
2015-12-06 22:04:34
Contained files by extension
xml
4
png
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
XML
4
unknown
4
PNG
3
DEX
1
File identification
MD5 704cbeef9e5ffcfeac78c767cafc4ece
SHA1 ff41494fa03513748f65ef618730160f844de3a5
SHA256 11e6ad80c1949a5f21af70ebd451b17334d7e077e7bc79383bf9fbd0e1572c90
ssdeep
3072:3OhdJAyIrMOpkkJmKa8XbuYGHuc57nqztAwx1/7zsFwAuaeGs4nmh:3O2pMOOMjaubuIcJncvxlsK7Lxh

File size 197.0 KB ( 201724 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-12-31 15:59:08 UTC ( 2 years, 10 months ago )
Last submission 2017-07-12 12:29:10 UTC ( 1 year, 4 months ago )
File names 11E6AD80C1949A5F21AF70EBD451B173
11e6ad80c1949a5f21af70ebd451b17334d7e077e7bc79383bf9fbd0e1572c90.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=net.droidjack.server/.Controller;end