× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dc4d66be87ced9ec005e11a636bbb272a2865ed43884d2a81c5f646ee52d229d
File name: get_player.php
Detection ratio: 31 / 55
Analysis date: 2016-01-19 01:00:38 UTC ( 2 years, 9 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.SLocker.BC 20160119
AhnLab-V3 Android-Trojan/Slocker.e425 20160118
Alibaba A.H.Pri.Gaudy 20160118
Antiy-AVL Trojan[Ransom:HEUR]/AndroidOS.Fusob.1 20160118
Avast Android:Locker-BW [Trj] 20160119
AVG Android/Deng.PC 20160118
Avira (no cloud) ANDROID/Locker.Z.Gen 20160119
Baidu-International Trojan.Win32.Agent.AaA 20160118
BitDefender Android.Trojan.SLocker.BC 20160119
CAT-QuickHeal Android.Simplocker.F 20160118
Cyren AndroidOS/GenBl.DF4DE56D!Olympus 20160119
DrWeb Android.Locker.89.origin 20160119
Emsisoft Android.Trojan.SLocker.BC (B) 20160119
ESET-NOD32 a variant of Android/Locker.AH 20160119
F-Secure Trojan:Android/SLocker.AV 20160119
Fortinet Android/Fusob.A!tr 20160118
GData Android.Trojan.SLocker.BC 20160119
Ikarus Trojan-Ransom.AndroidOS.PornDroid 20160119
K7GW Trojan ( 000027101 ) 20160118
Kaspersky HEUR:Trojan-Ransom.AndroidOS.Fusob.a 20160119
McAfee Artemis!DF4DE56DB6C7 20160119
McAfee-GW-Edition Artemis!Trojan 20160119
Microsoft Ransom:AndroidOS/LockScreen.A 20160119
eScan Android.Trojan.SLocker.BC 20160119
NANO-Antivirus Trojan.Android.Ransom.dpajhb 20160119
Qihoo-360 Trojan.Android.Gen 20160119
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160118
Sophos AV Andr/InfoStl-AD 20160118
Tencent Android.Trojan.Fusob.Wtnp 20160119
VIPRE Trojan.AndroidOS.Generic.A 20160119
Zoner Trojan.AndroidOS.SIMLocker.B 20160118
AegisLab 20160118
Yandex 20160118
ALYac 20160119
Arcabit 20160119
Bkav 20160118
ByteHero 20160119
ClamAV 20160118
CMC 20160111
Comodo 20160118
F-Prot 20160119
Jiangmin 20160119
K7AntiVirus 20160118
Malwarebytes 20160119
nProtect 20160118
Panda 20160118
SUPERAntiSpyware 20160118
Symantec 20160118
TheHacker 20160116
TotalDefense 20160118
TrendMicro 20160119
TrendMicro-HouseCall 20160119
VBA32 20160117
ViRobot 20160118
Zillya 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.educationally.minnows. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.WRITE_CONTACTS (write contact data)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
android.permission.ACCESS_COARSE_UPDATES (Unknown permission from android reference)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.CAMERA (take pictures and videos)
android.permission.INTERNET (full Internet access)
android.permission.READ_PROFILE (read the user's personal profile data)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_CONTACTS (read contact data)
Activities
net.educationally.minnows.MainActivity
net.educationally.minnows.RelianceActivity
net.educationally.minnows.RustierActivity
net.educationally.minnows.DowngradeActivity
net.educationally.minnows.TiptoeingActivity
Services
net.educationally.minnows.TentacleService
net.educationally.minnows.zzzMainService5
Receivers
net.educationally.minnows.zzzMainReceiver4
net.educationally.minnows.Multicoloured
Activity-related intent filters
net.educationally.minnows.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
net.educationally.minnows.zzzMainReceiver4
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, android.intent.action.SCREEN_ON, android.intent.action.NEW_OUTGOING_CALL, android.intent.action.PHONE_STATE
net.educationally.minnows.Multicoloured
actions: android.app.action.DEVICE_ADMIN_ENABLED
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
9
Uncompressed size
73372
Highest datetime
2015-02-26 22:57:56
Lowest datetime
2015-02-26 22:57:54
Contained files by extension
xml
3
dex
1
MF
1
RSA
1
SF
1
png
1
Contained files by type
unknown
4
XML
3
DEX
1
PNG
1
File identification
MD5 df4de56db6c72fa6c422609f90d2147c
SHA1 2320bc5574c714277d98e35329e3ed29922fb777
SHA256 dc4d66be87ced9ec005e11a636bbb272a2865ed43884d2a81c5f646ee52d229d
ssdeep
768:Oh4EcYulSKRhF/XweHUcNVip15Ojzm7R4boVdjD:Oh10SKRjX9HRC5Ojzm7DVp

File size 37.9 KB ( 38766 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android

VirusTotal metadata
First submission 2015-03-03 19:13:32 UTC ( 3 years, 8 months ago )
Last submission 2015-03-03 19:13:32 UTC ( 3 years, 8 months ago )
File names get_player.php
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started activities
#Intent;launchFlags=0x30000000;component=net.educationally.minnows/.RustierActivity;end
Started services
#Intent;component=net.educationally.minnows/.zzzMainService5;end
#Intent;action=android.intent.action.BOOT_COMPLETED;component=net.educationally.minnows/.zzzMainService5;end
Started receivers
android.intent.action.SCREEN_ON
android.intent.action.SCREEN_OFF
Opened files
/mnt/sdcard/Download
Accessed files
/data/data/net.educationally.minnows/files
/data/data/net.educationally.minnows/files/squalid.jpg
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://collectorsclubs.net
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...
http://logmydog.com
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...