× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 684a7c93a81a02d41554ccd2e3ef3eef135cda94ad67f9630e9e7459dd549ac2
File name: 684A7C93A81A02D41554CCD2E3EF3EEF135CDA94AD67F9630E9E7459DD549AC2.apk
Detection ratio: 33 / 54
Analysis date: 2016-01-18 21:28:57 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.Dendroid.A 20160118
AegisLab Dingwe 20160118
AhnLab-V3 Android-Trojan/Dendroid.d475 20160118
Alibaba A.H.Pri.FakeAdobe 20160118
Antiy-AVL Trojan[Backdoor]/AndroidOS.Dingwe.a 20160118
Arcabit Android.Trojan.Dendroid.A 20160118
Avast Android:Dingwe-A [Trj] 20160118
AVG Android/Deng.RLD 20160118
Baidu-International Trojan.Android.Dingwe.D 20160118
BitDefender Android.Trojan.Dendroid.A 20160118
CAT-QuickHeal Android.Dingwe.A 20160118
Comodo UnclassifiedMalware 20160118
Cyren AndroidOS/Dendroid.A.gen!Eldorado 20160118
DrWeb Android.Dendroid.1.origin 20160118
Emsisoft Android.Trojan.Dendroid.A (B) 20160118
ESET-NOD32 a variant of Android/Dingwe.A 20160118
F-Secure Backdoor:Android/Dendroid.D 20160118
Fortinet Android/Dendroid.A!tr 20160118
GData Android.Trojan.Dendroid.A 20160118
Ikarus Backdoor.AndroidOS.Dendroid 20160118
Jiangmin Backdoor/AndroidOS.ban 20160118
K7GW Trojan ( 004b59c41 ) 20160118
Kaspersky HEUR:Backdoor.AndroidOS.Dingwe.a 20160118
McAfee Artemis!C42DE11407EF 20160118
eScan Android.Trojan.Dendroid.A 20160118
NANO-Antivirus Trojan.Android.Banker.dxshbq 20160118
Qihoo-360 Trojan.Android.Gen 20160118
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160118
Sophos AV Andr/Dendroid-B 20160118
TrendMicro ANDROIDOS_DENDROID.XA 20160118
TrendMicro-HouseCall ANDROIDOS_DENDROID.XA 20160118
VIPRE Trojan.AndroidOS.Generic.A 20160118
Zoner Trojan.AndroidOS.Dingwe.A 20160118
Yandex 20160118
ALYac 20160118
Avira (no cloud) 20160118
Bkav 20160118
ByteHero 20160118
ClamAV 20160118
CMC 20160111
F-Prot 20160118
K7AntiVirus 20160118
Malwarebytes 20160118
McAfee-GW-Edition 20160118
Microsoft 20160118
nProtect 20160118
Panda 20160118
SUPERAntiSpyware 20160118
Symantec 20160118
TheHacker 20160116
TotalDefense 20160118
VBA32 20160117
ViRobot 20160118
Zillya 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.adobe.flash13. The internal version number of the application is 2. The displayed version string of the application is 2.0. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.QUICKBOOT_POWERON (Unknown permission from android reference)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.CAMERA (take pictures and videos)
android.permission.READ_CONTACTS (read contact data)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.INTERNET (full Internet access)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECORD_AUDIO (record audio)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECEIVE_SMS (receive SMS)
Activities
com.connect.Drodian
com.connect.Dialog
com.connect.CaptureCameraImage
com.connect.CameraView
com.connect.VideoView
Services
com.connect.MyService
com.connect.RecordService
Receivers
com.connect.ServiceReceiver
Activity-related intent filters
com.connect.Drodian
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.connect.ServiceReceiver
actions: android.intent.action.BOOT_COMPLETED, android.provider.Telephony.SMS_RECEIVED, android.intent.action.PHONE_STATE, android.intent.action.ACTION_EXTERNAL_APPLICATIONS_AVAILABLE, android.intent.action.QUICKBOOT_POWERON
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
16
Uncompressed size
1059917
Highest datetime
2015-03-11 11:10:36
Lowest datetime
2015-03-11 09:52:48
Contained files by extension
xml
5
png
4
dex
1
MF
1
jar
1
RSA
1
SF
1
Contained files by type
XML
5
unknown
5
PNG
4
DEX
1
ZIP
1
File identification
MD5 c42de11407ef5cc0e1f21a2bf16ef62b
SHA1 3b50db0434e9358641eb5715692367c29ce5387c
SHA256 684a7c93a81a02d41554ccd2e3ef3eef135cda94ad67f9630e9e7459dd549ac2
ssdeep
12288:JJ3cziUSSvfIjBVF4inErcOeuboJRDwChubjkfCjkfXjkfGjkfVGijLiZoiuYV2p:JJJwwjBVOiEgOeuboJRXFo3F

File size 569.1 KB ( 582745 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk checks-gps android

VirusTotal metadata
First submission 2015-04-02 21:46:15 UTC ( 3 years, 7 months ago )
Last submission 2015-05-06 10:50:20 UTC ( 3 years, 6 months ago )
File names 684A7C93A81A02D41554CCD2E3EF3EEF135CDA94AD67F9630E9E7459DD549AC2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=com.adobe.flash13/com.connect.MyService;end
Opened files
/mnt/sdcard
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Contacted URLs
http://newaera.ru/as//get.php/UID=6d50a4b7650138e&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=94&Password=password
http://newaera.ru/as//get.php/UID=6d50a4b7650138e&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=473&Password=password
http://newaera.ru/as//get.php/UID=6d50a4b7650138e&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=652&Password=password
http://newaera.ru/as//get.php/UID=6d50a4b7650138e&Provider=Android&Phone_Number=15555215554&Coordinates=null,null&Device=NexusS&Sdk=15&Version=1&Random=763&Password=password
http://newaera.ru/as//get-functions.php?UID=6d50a4b7650138e&Password=password