× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4c0ead5d0b9ce5fbdbefc08bdda75f23c94902547ab3d75b3d74b3c34912e378
File name: myfile.apk
Detection ratio: 33 / 60
Analysis date: 2017-03-15 10:35:50 UTC ( 6 months, 1 week ago )
Antivirus Result Update
Ad-Aware Android.Trojan.DroidKungFu.L 20170315
AegisLab KungFu_1 20170315
AhnLab-V3 Android-Trojan/Anserver.22fa9 20170314
Alibaba A.H.Sys.NstrInst 20170228
ALYac Android.Exploit.Exploid.G 20170315
Antiy-AVL Trojan[Backdoor]/Android.KungFu.z 20170315
Arcabit Android.Trojan.DroidKungFu.B 20170315
Avast ELF:KungFu-C [Trj] 20170315
AVG Android/G2M.NW.5285F0171A53 20170315
Avira (no cloud) ANDROID/Malmix2.3 20170315
AVware Trojan.AndroidOS.DroidKungFu.a 20170315
Baidu Android.Trojan.DroidKungFu.v 20170315
BitDefender Android.Trojan.DroidKungFu.L 20170315
Bkav Android.Backdoor.KungFu.A.Rubik.4DE3 20170314
CAT-QuickHeal Linux.Trojan.DroidKrungFu.A 20170314
ClamAV Andr.Trojan.KungFu-9 20170315
Cyren ELF/Trojan.IDDO-3 20170315
DrWeb Android.Gongfu.6 20170315
Emsisoft Android.Trojan.DroidKungFu.L (B) 20170315
ESET-NOD32 Android/DroidKungFu.C 20170315
F-Secure Android.Trojan.DroidKungFu.L 20170315
Fortinet Android/DroidKungFu.B!tr 20170315
GData Android.Trojan.DroidKungFu.L 20170315
Ikarus Backdoor.AndroidOS.KungFu 20170315
Jiangmin Exploit.Linux.ao 20170315
Kaspersky Exploit.Linux.Lotoor.x 20170315
eScan Android.Trojan.DroidKungFu.L 20170315
NANO-Antivirus Trojan.KungFu.bfnfgi 20170315
Sophos AV Andr/DroidRt-A 20170315
TotalDefense Kugfu.XAWM!suspicious 20170315
WhiteArmor Android-Malware.SN-Sure.0636112928363846.[Trojan] 20170303
Zillya Trojan.DroidKungFu..6 20170314
ZoneAlarm by Check Point HEUR:Exploit.AndroidOS.Lotoor.by 20170315
CMC 20170315
Comodo 20170315
CrowdStrike Falcon (ML) 20170130
Endgame 20170222
F-Prot 20170315
Sophos ML 20170203
K7AntiVirus 20170315
K7GW 20170315
Kingsoft 20170315
Malwarebytes 20170315
McAfee 20170315
McAfee-GW-Edition 20170315
Microsoft 20170315
nProtect 20170315
Palo Alto Networks (Known Signatures) 20170315
Panda 20170314
Qihoo-360 20170315
Rising 20170315
SUPERAntiSpyware 20170315
Symantec 20170314
Tencent 20170315
TheHacker 20170315
TrendMicro 20170315
TrendMicro-HouseCall 20170315
Trustlook 20170315
VBA32 20170315
VIPRE 20170315
ViRobot 20170315
Webroot 20170315
Yandex 20170312
Zoner 20170315
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.itxinke.Puzzle. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 4.
Required permissions
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.READ_PHONE_STATE (read phone state and identity)
Activities
com.itxinke.Puzzle.MainActivity
com.itxinke.Puzzle.PuzzleActivity
com.itxinke.Puzzle.OptionActivity
com.itxinke.Puzzle.OrigActivity
com.itxinke.Puzzle.LevelActivity
com.itxinke.Puzzle.HelpActivity
com.eguan.state.Dialog
Services
com.eguan.state.StateService
Receivers
com.eguan.state.Receiver
Activity-related intent filters
com.itxinke.Puzzle.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.eguan.state.Receiver
actions: android.intent.action.BATTERY_CHANGED_ACTION, android.intent.action.SIG_STR, android.intent.action.BOOT_COMPLETED
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
40
Uncompressed size
1377446
Highest datetime
2014-02-23 19:01:56
Lowest datetime
2014-02-23 19:01:56
Contained files by extension
png
17
xml
10
jpg
2
dex
1
MF
1
RSA
1
so
1
mp3
1
SF
1
Contained files by type
PNG
17
XML
10
unknown
5
ELF
4
JPG
2
DEX
1
MP3
1
File identification
MD5 160f77447f80d1e0b868b7af40d365bc
SHA1 9c65ae99fafadaaef4e60cf27f167a85f0080965
SHA256 4c0ead5d0b9ce5fbdbefc08bdda75f23c94902547ab3d75b3d74b3c34912e378
ssdeep
24576:Taobrw1x08EnXEsmennngcvwaTrrGgwSCiGgSQHQo90NZT:mobrKAXEsDnFrTrrGBD7gdHyZT

File size 1.2 MB ( 1280449 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2017-03-15 10:35:50 UTC ( 6 months, 1 week ago )
Last submission 2017-03-15 10:35:50 UTC ( 6 months, 1 week ago )
File names myfile.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!