× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c73e7975bfb13c2ff0fd68205b1ab275de94e6fc54be94e8c334e3aa8527a5b7
File name: myfile.apk
Detection ratio: 37 / 60
Analysis date: 2017-03-15 12:42:54 UTC ( 9 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.DroidKungFu.L 20170315
AegisLab Exploit.Linux.Lotoor!c 20170315
AhnLab-V3 Android-Trojan/Anserver.22fa9 20170315
Alibaba A.H.Sys.NstrInst 20170228
ALYac Android.Exploit.Exploid.G 20170315
Antiy-AVL Trojan[Backdoor]/Android.KungFu.z 20170315
Arcabit Android.Trojan.DroidKungFu.L 20170315
Avast ELF:KungFu-C [Trj] 20170315
Avira (no cloud) ANDROID/Malmix2.3 20170315
AVware Trojan.AndroidOS.DroidKungFu.a 20170315
BitDefender Android.Trojan.DroidKungFu.L 20170315
Bkav Android.Backdoor.KungFu.A.Rubik.CFE5 20170314
CAT-QuickHeal Linux.Trojan.DroidKrungFu.A 20170314
ClamAV Andr.Trojan.KungFu-9 20170315
Cyren ELF/Trojan.IDDO-3 20170315
DrWeb Android.Gongfu.6 20170315
Emsisoft Android.Trojan.DroidKungFu.L (B) 20170315
ESET-NOD32 Android/DroidKungFu.C 20170315
F-Secure Android.Trojan.DroidKungFu.L 20170315
Fortinet Android/DroidKungFu.B!tr 20170315
GData Android.Trojan.DroidKungFu.L 20170315
Ikarus Backdoor.AndroidOS.KungFu 20170315
Jiangmin Exploit.Linux.ao 20170315
K7GW Trojan ( 004c39741 ) 20170315
Kaspersky Exploit.Linux.Lotoor.x 20170315
NANO-Antivirus Trojan.KungFu.bfnfgi 20170315
Qihoo-360 Android mobile malware 20170315
Rising Trojan.Boogr/Android!8.DCA0 (cloud:FrhRBD23raE) 20170315
Sophos AV Andr/DroidRt-A 20170315
Symantec Trojan.Gen.2 20170314
Tencent SH.!Android.EExtra.Gen.3f 20170315
TotalDefense Kugfu.XAWM!suspicious 20170315
TrendMicro ELF_LOTOOR.A 20170315
TrendMicro-HouseCall ELF_LOTOOR.A 20170315
WhiteArmor Android-Malware.SN-Sure.0636112928363846.[Trojan] 20170315
Zillya Trojan.DroidKungFu..6 20170314
ZoneAlarm by Check Point HEUR:Exploit.AndroidOS.Lotoor.by 20170315
AVG 20170315
Baidu 20170315
CMC 20170315
Comodo 20170315
CrowdStrike Falcon (ML) 20170130
Endgame 20170222
F-Prot 20170315
Sophos ML 20170203
K7AntiVirus 20170315
Kingsoft 20170315
Malwarebytes 20170315
McAfee 20170315
McAfee-GW-Edition 20170315
Microsoft 20170315
eScan 20170315
nProtect 20170315
Palo Alto Networks (Known Signatures) 20170315
Panda 20170314
SUPERAntiSpyware 20170315
TheHacker 20170315
Trustlook 20170315
VBA32 20170315
VIPRE 20170315
ViRobot 20170315
Webroot 20170315
Yandex 20170315
Zoner 20170315
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tutusw.fingerscanner. The internal version number of the application is 5. The displayed version string of the application is 1.5.2. The minimum Android API level for the application to run (MinSDKVersion) is 3.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.DISABLE_KEYGUARD (disable key lock)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.INTERNET (full Internet access)
Activities
com.tutusw.fingerscanner.SettingsActivity
com.tutusw.fingerscanner.l
com.tutusw.fingerscanner.n
com.tutusw.fingerscanner.a
Services
com.tutusw.fingerscanner.d
com.tutusw.fingerscanner.z
Receivers
com.eguan.state.Receiver
com.tutusw.fingerscanner.BootReceiver
Activity-related intent filters
com.tutusw.fingerscanner.SettingsActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.tutusw.fingerscanner.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
com.eguan.state.Receiver
actions: android.intent.action.BATTERY_CHANGED_ACTION, android.intent.action.SIG_STR, android.intent.action.BOOT_COMPLETED
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
38
Uncompressed size
897972
Highest datetime
2014-03-14 14:43:56
Lowest datetime
2014-03-14 14:43:56
Contained files by extension
jpg
19
xml
6
ogg
2
png
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
JPG
19
XML
6
unknown
5
ELF
3
OGG
2
PNG
2
DEX
1
File identification
MD5 0843d4c66c6882f55c859bfb765662cc
SHA1 ff4a76ae1c82f398f9dacb4f90db523186caee98
SHA256 c73e7975bfb13c2ff0fd68205b1ab275de94e6fc54be94e8c334e3aa8527a5b7
ssdeep
12288:LmaACzo3FidOMhvm8XLd32PzGQ4SOo3j0TUS3RVbJFAyRmYLXffx67jK2wr:LuFihECQPTGUI3XAyR7zh675wr

File size 778.3 KB ( 797001 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2017-02-08 10:23:45 UTC ( 10 months, 1 week ago )
Last submission 2017-03-15 12:42:54 UTC ( 9 months ago )
File names DroidKungFu219.apk
myfile.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!