× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 427f3fcc416d682eeb9490eeefff26aded5d86cdfdf55a4ade9c12a3367588c9
File name: whatsapp+.apk
Detection ratio: 26 / 57
Analysis date: 2015-10-18 03:13:40 UTC ( 3 years, 1 month ago )
Antivirus Result Update
Ad-Aware Android.Trojan.AndroRAT.E 20151018
AegisLab SUSPICIOUS 20151017
Alibaba A.W.Rog.EvilCert.A24 20151016
Arcabit Android.Trojan.AndroRAT.E 20151018
Avast Android:Kasandra-E [Trj] 20151018
AVG Android/Deng.DED 20151018
Avira (no cloud) ANDROID/Spy.Kasandra.A.Gen 20151017
AVware Trojan.AndroidOS.Generic.A 20151017
Baidu-International Trojan.Android.Kasandra.C 20151017
BitDefender Android.Trojan.AndroRAT.E 20151018
CAT-QuickHeal Android.Sandr.A 20151017
Cyren AndroidOS/Sandr.A.gen!Eldorado 20151018
DrWeb Android.Spy.184.origin 20151018
Emsisoft Android.Trojan.AndroRAT.E (B) 20151018
ESET-NOD32 a variant of Android/Spy.Kasandra.C 20151017
F-Secure Trojan:Android/AndroRat.K 20151017
Fortinet Android/Sandr.C!tr 20151018
GData Android.Trojan.AndroRAT.E 20151018
Ikarus Trojan-Spy.AndroidOS.Kasandra 20151017
K7GW Trojan ( 004c6d9e1 ) 20151017
Kaspersky HEUR:Trojan-Spy.AndroidOS.Sandr.a 20151018
McAfee Artemis!8CDA92798209 20151018
eScan Android.Trojan.AndroRAT.E 20151018
NANO-Antivirus Trojan.Android.Zerat.dekxmy 20151018
Sophos AV Andr/SandRat-B 20151018
VIPRE Trojan.AndroidOS.Generic.A 20151018
Yandex 20151017
AhnLab-V3 20151017
ALYac 20151018
Antiy-AVL 20151017
Bkav 20151017
ByteHero 20151018
ClamAV 20151017
CMC 20151016
Comodo 20151018
F-Prot 20151018
Jiangmin 20151017
K7AntiVirus 20151017
Kingsoft 20151018
Malwarebytes 20151017
McAfee-GW-Edition 20151017
Microsoft 20151017
nProtect 20151016
Panda 20151017
Qihoo-360 20151018
Rising 20151017
SUPERAntiSpyware 20151018
Symantec 20151017
Tencent 20151018
TheHacker 20151017
TotalDefense 20151016
TrendMicro 20151018
TrendMicro-HouseCall 20151018
VBA32 20151016
ViRobot 20151017
Zillya 20151017
Zoner 20151018
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.droidjack.server. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 17.
Risk summary
The studied DEX file makes use of API reflection
The studied DEX file makes use of cryptographic functions
Permissions that allow the application to manipulate SMS
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECORD_AUDIO (record audio)
android.permission.READ_CONTACTS (read contact data)
android.permission.GET_ACCOUNTS (discover known accounts)
Permission-related API calls
FACTORY_TEST
GET_TASKS
ACCESS_NETWORK_STATE
RECORD_AUDIO
INTERNET
SEND_SMS
ACCESS_WIFI_STATE
CAMERA
READ_LOGS
READ_CONTACTS
CHANGE_COMPONENT_ENABLED_STATE
READ_PHONE_STATE
WRITE_HISTORY_BOOKMARKS
WAKE_LOCK
ACCESS_FINE_LOCATION
Main Activity
net.droidjack.server.MainActivity
Activities
net.droidjack.server.MainActivity
net.droidjack.server.CamSnap
net.droidjack.server.VideoCap
Services
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
Receivers
net.droidjack.server.Connector
net.droidjack.server.CallListener
Activity-related intent filters
net.droidjack.server.CamSnap
actions: android.intent.action.CAMSNAP
categories: android.intent.category.DEFAULT
net.droidjack.server.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
net.droidjack.server.VideoCap
actions: android.intent.action.VIDEOCAP
categories: android.intent.category.DEFAULT
Receiver-related intent filters
net.droidjack.server.Connector
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BOOT_COMPLETED
net.droidjack.server.CallListener
actions: android.intent.action.PHONE_STATE
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
479611
Highest datetime
2015-10-16 00:00:34
Lowest datetime
2015-10-16 00:00:34
Contained files by extension
xml
4
png
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
XML
4
unknown
4
PNG
3
DEX
1
Compressed bundles
File identification
MD5 c529c9b6d5a3352897f48a6537287843
SHA1 eafe10b6c5e3b6e879ed095a4750816386d435e9
SHA256 427f3fcc416d682eeb9490eeefff26aded5d86cdfdf55a4ade9c12a3367588c9
ssdeep
6144:64UBy5qQ/u9mivPZ/ZCAHckaW9Doztx5uQCIC:FjsQ2IEkNka0DUJrC

File size 211.0 KB ( 216046 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-10-18 03:13:40 UTC ( 3 years, 1 month ago )
Last submission 2015-10-18 03:13:40 UTC ( 3 years, 1 month ago )
File names whatsapp+.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=net.droidjack.server/.Controller;end