× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dcdf09d30024ed627287c5820f6727dad0908b057752695131ebe6995c7e2022
File name: 995C1D0B61C86601D8A2C58B222B5AAC
Detection ratio: 32 / 54
Analysis date: 2016-02-11 21:29:24 UTC ( 2 years, 10 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.AndroRAT.E 20160211
AegisLab Troj.Spy.Androidos!c 20160211
AhnLab-V3 Android-Trojan/Sandrorat.c542 20160211
Alibaba A.H.Pay.Sandrorat6 20160204
Antiy-AVL Trojan[Spy:HEUR]/Android.Sandr.1 20160211
Arcabit Android.Trojan.AndroRAT.E 20160211
Avast Android:DroidJack-A [Trj] 20160211
AVG Android/Deng.DED 20160211
Avira (no cloud) ANDROID/Spy.Kasandra.E.Gen 20160211
Baidu-International Trojan.AndroidOS.Sandr.a 20160211
BitDefender Android.Trojan.AndroRAT.E 20160211
CAT-QuickHeal Android.Sandr.A 20160211
Cyren AndroidOS/Sandr.A.gen!Eldorado 20160211
DrWeb Android.Spy.184.origin 20160211
Emsisoft Android.Trojan.AndroRAT.E (B) 20160211
ESET-NOD32 a variant of Android/Spy.Kasandra.A 20160211
F-Secure Trojan:Android/AndroRat.K 20160211
Fortinet Android/Sandr.C!tr 20160211
GData Android.Trojan.AndroRAT.E 20160211
Ikarus Trojan-Spy.AndroidOS.Kasandra 20160211
Kaspersky HEUR:Trojan-Spy.AndroidOS.Sandr.a 20160211
McAfee Artemis!607A7E708174 20160211
McAfee-GW-Edition Artemis!Trojan 20160211
eScan Android.Trojan.AndroRAT.E 20160211
NANO-Antivirus Trojan.Android.Zerat.dekxmy 20160211
Qihoo-360 Trojan.Android.Gen 20160211
Rising APK:Trojan.Generic(AndrCity)!7.1762 [F] 20160211
Sophos AV Andr/SandRat-B 20160211
Tencent SH.!Android.GenA.1019 20160211
VIPRE Trojan.AndroidOS.Generic.A 20160211
Zillya Trojan.Kasandra..494 20160211
Zoner Trojan.AndroidOS.Kasandra.A 20160211
Yandex 20160210
Bkav 20160204
ByteHero 20160211
ClamAV 20160211
CMC 20160205
Comodo 20160211
F-Prot 20160211
Jiangmin 20160211
K7AntiVirus 20160211
K7GW 20160211
Malwarebytes 20160211
Microsoft 20160211
nProtect 20160211
Panda 20160210
SUPERAntiSpyware 20160211
Symantec 20160211
TheHacker 20160210
TotalDefense 20160211
TrendMicro 20160211
TrendMicro-HouseCall 20160211
VBA32 20160211
ViRobot 20160211
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.droidjack.server. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 17.
Risk summary
The studied DEX file makes use of API reflection
The studied DEX file makes use of cryptographic functions
Permissions that allow the application to manipulate SMS
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECORD_AUDIO (record audio)
android.permission.READ_CONTACTS (read contact data)
android.permission.GET_ACCOUNTS (discover known accounts)
Permission-related API calls
FACTORY_TEST
GET_TASKS
ACCESS_NETWORK_STATE
RECORD_AUDIO
INTERNET
SEND_SMS
ACCESS_WIFI_STATE
CAMERA
READ_LOGS
READ_CONTACTS
CHANGE_COMPONENT_ENABLED_STATE
READ_PHONE_STATE
WRITE_HISTORY_BOOKMARKS
WAKE_LOCK
ACCESS_FINE_LOCATION
Main Activity
net.droidjack.server.MainActivity
Activities
net.droidjack.server.MainActivity
net.droidjack.server.CamSnap
net.droidjack.server.VideoCap
Services
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
Receivers
net.droidjack.server.Connector
net.droidjack.server.CallListener
Activity-related intent filters
net.droidjack.server.CamSnap
actions: android.intent.action.CAMSNAP
categories: android.intent.category.DEFAULT
net.droidjack.server.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
net.droidjack.server.VideoCap
actions: android.intent.action.VIDEOCAP
categories: android.intent.category.DEFAULT
Receiver-related intent filters
net.droidjack.server.Connector
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BOOT_COMPLETED
net.droidjack.server.CallListener
actions: android.intent.action.PHONE_STATE
Application certificate information
Application bundle files
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
460916
Highest datetime
2015-08-26 23:02:28
Lowest datetime
2015-08-26 23:02:26
Contained files by extension
xml
4
png
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
XML
4
unknown
4
PNG
3
DEX
1
File identification
MD5 607a7e708174a5bc49d6c5676c6552f3
SHA1 995c1d0b61c86601d8a2c58b222b5aacd8f60688
SHA256 dcdf09d30024ed627287c5820f6727dad0908b057752695131ebe6995c7e2022
ssdeep
6144:x+zH3KPYJySlZf1xj2D+8hqfwXvHhNWazPRDq8zSoO:xgyO3xgDvhQabllO

File size 192.7 KB ( 197319 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-08-30 02:22:08 UTC ( 3 years, 3 months ago )
Last submission 2015-08-30 02:22:08 UTC ( 3 years, 3 months ago )
File names 995C1D0B61C86601D8A2C58B222B5AAC
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!