× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ad0122f415c905b89cae1c3b554eb76d6f46dd435d0f84c1707d5da0cfa38b3e
File name: HACK-WIFI.apk.apk
Detection ratio: 39 / 62
Analysis date: 2017-12-31 00:22:03 UTC ( 8 months, 3 weeks ago )
Antivirus Result Update
AegisLab SUSPICIOUS 20171230
Alibaba A.H.Rem.Climap.C 20171229
Arcabit Android.Riskware.AndroRat.A 20171230
Avast Android:Androrat-I [Trj] 20171230
Avast-Mobile Android:Androrat-I [Trj] 20171230
AVG Android:Androrat-I [Trj] 20171230
Avira (no cloud) ANDROID/AndroRAT.A.Gen 20171230
AVware Trojan.AndroidOS.Generic.A 20171231
Baidu Android.Trojan.AndroRAT.k 20171227
BitDefender Android.Riskware.AndroRat.A 20171231
CAT-QuickHeal Android.Climap.GEN212 20171230
ClamAV Andr.Trojan.Androrat-1 20171230
Cyren AndroidOS/AndroRAT.A 20171230
DrWeb Android.Androrat.1.origin 20171231
Emsisoft Android.Riskware.AndroRat.A (B) 20171230
ESET-NOD32 a variant of Android/Spy.AndroRAT.A 20171230
F-Prot AndroidOS/AndroRAT.A 20171231
F-Secure Monitoring-Tool:Android/AndroRat.B 20171231
Fortinet Android/AndroRat.A!tr 20171231
GData Android.Riskware.AndroRat.A 20171231
Ikarus Trojan-Spy.AndroidOS.Androrat 20171230
K7GW Spyware ( 004c0e381 ) 20171230
Kaspersky HEUR:Backdoor.AndroidOS.Climap.a 20171230
MAX malware (ai score=70) 20171231
McAfee Artemis!8D2197350268 20171231
McAfee-GW-Edition Artemis 20171230
Microsoft MonitoringTool:AndroidOS/AndroRat 20171230
eScan Android.Riskware.AndroRat.A 20171231
NANO-Antivirus Trojan.Android.TrjGen.dzzhxe 20171231
Qihoo-360 Trojan.Android.Gen 20171231
Rising Backdoor.Android.Climap.a (CLASSIC) 20171230
Sophos AV Andr/AndroRat-C 20171231
Symantec Trojan.Gen.2 20171230
Symantec Mobile Insight Spyware:MobileSpy 20171230
Tencent Trojan.Android.Climap.a 20171231
Trustlook Android.Malware.Androrat 20171231
WhiteArmor Malware.HighConfidence 20171226
ZoneAlarm by Check Point HEUR:Backdoor.AndroidOS.Climap.a 20171230
Zoner Trojan.AndroidOS.AndroRat.A 20171230
Ad-Aware 20171225
ALYac 20171231
Antiy-AVL 20171230
Bkav 20171229
CMC 20171229
Comodo 20171230
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171231
eGambit 20171231
Endgame 20171130
Sophos ML 20170914
Jiangmin 20171230
K7AntiVirus 20171230
Kingsoft 20171231
Malwarebytes 20171230
nProtect 20171230
Palo Alto Networks (Known Signatures) 20171231
Panda 20171230
SentinelOne (Static ML) 20171224
SUPERAntiSpyware 20171230
TheHacker 20171229
TotalDefense 20171230
TrendMicro 20171230
TrendMicro-HouseCall 20171230
VBA32 20171229
VIPRE 20171230
ViRobot 20171230
Webroot 20171231
Yandex 20171229
Zillya 20171229
The file being studied is Android related! APK Android file more specifically. The application's main package name is my.app.client. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
android.permission.VIBRATE (control vibrator)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
android.permission.RECORD_AUDIO (record audio)
Activities
my.app.client.LauncherActivity
my.app.alt.PhotoActivity
Services
my.app.client.Client
Receivers
my.app.client.BootReceiver
my.app.client.AlarmListener
Service-related intent filters
my.app.client.Client
actions: .Client
Activity-related intent filters
my.app.client.LauncherActivity
actions: android.intent.action.MAIN
Receiver-related intent filters
my.app.client.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
118556
Highest datetime
2015-01-29 18:17:30
Lowest datetime
2015-01-29 18:17:30
Contained files by extension
png
4
xml
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
4
PNG
4
XML
3
DEX
1
Compressed bundles
File identification
MD5 8d21973502684cb735072f26f67f4e2b
SHA1 855d43744069a0086d78e4ccbdae0ffc9fe0d04f
SHA256 ad0122f415c905b89cae1c3b554eb76d6f46dd435d0f84c1707d5da0cfa38b3e
ssdeep
1536:LjfKWKILyjYtIpgLUMI/p+5qswhFysQ1txKWUtsQbdJMy3HS:LjfXKdUWpgHI/pvsgFZQ1txlQbdJM+y

File size 67.0 KB ( 68633 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-05-09 18:28:42 UTC ( 3 years, 4 months ago )
Last submission 2015-05-09 18:28:42 UTC ( 3 years, 4 months ago )
File names HACK-WIFI.apk.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!