× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: dfefb992a19b3e98725f8aa5d724384f6faf1549882bc5ac3969601f82927077
File name: myfile.apk
Detection ratio: 35 / 59
Analysis date: 2017-03-15 10:35:23 UTC ( 7 months, 1 week ago )
Antivirus Result Update
Ad-Aware Android.Trojan.DroidKungFu.L 20170315
AegisLab SUSPICIOUS 20170315
AhnLab-V3 Android-Trojan/Anserver.22fa9 20170314
Alibaba A.H.Sys.NstrInst 20170228
ALYac Android.Exploit.Exploid.G 20170315
Antiy-AVL Trojan[Backdoor]/Android.KungFu.z 20170315
Arcabit Android.Trojan.DroidKungFu.B 20170315
Avast ELF:KungFu-C [Trj] 20170315
AVG Android/Kungf 20170315
Avira (no cloud) ANDROID/Malmix2.3 20170315
AVware Trojan.AndroidOS.DroidKungFu.a 20170315
Baidu Android.Trojan.DroidKungFu.v 20170315
BitDefender Android.Trojan.DroidKungFu.L 20170315
Bkav Android.Backdoor.KungFu.A.Rubik.7AC5 20170314
CAT-QuickHeal Linux.Trojan.DroidKrungFu.A 20170314
ClamAV Andr.Trojan.KungFu-9 20170315
Cyren ELF/Trojan.IDDO-3 20170315
DrWeb Android.Gongfu.6 20170315
Emsisoft Android.Trojan.DroidKungFu.L (B) 20170315
ESET-NOD32 Android/DroidKungFu.C 20170315
F-Secure Android.Trojan.DroidKungFu.L 20170315
Fortinet Android/DroidKungFu.B!tr 20170315
GData Android.Trojan.DroidKungFu.L 20170315
Ikarus Backdoor.AndroidOS.KungFu 20170315
Jiangmin Exploit.Linux.ao 20170315
Kaspersky Exploit.Linux.Lotoor.x 20170315
eScan Android.Trojan.DroidKungFu.B 20170315
NANO-Antivirus Trojan.KungFu.bfnfgi 20170315
Sophos AV Andr/DroidRt-A 20170315
Tencent SH.!Android.EExtra.Gen.3f 20170315
TotalDefense Kugfu.XAWM!suspicious 20170315
TrendMicro-HouseCall ELF_LOTOOR.A 20170315
WhiteArmor Android-Malware.SN-Sure.0636112928363846.[Trojan] 20170303
Zillya Trojan.DroidKungFu..6 20170314
ZoneAlarm by Check Point HEUR:Exploit.AndroidOS.Lotoor.by 20170315
CMC 20170315
Comodo 20170315
CrowdStrike Falcon (ML) 20170130
Endgame 20170222
F-Prot 20170315
Sophos ML 20170203
K7AntiVirus 20170315
K7GW 20170315
Kingsoft 20170315
Malwarebytes 20170315
McAfee 20170315
McAfee-GW-Edition 20170315
Microsoft 20170315
nProtect 20170315
Palo Alto Networks (Known Signatures) 20170315
Panda 20170314
Qihoo-360 20170315
Rising 20170315
SUPERAntiSpyware 20170315
Symantec 20170314
TheHacker 20170315
Trustlook 20170315
VBA32 20170315
VIPRE 20170315
ViRobot 20170315
Webroot 20170315
Yandex 20170312
Zoner 20170315
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tutusw.fingerscanner. The internal version number of the application is 5. The displayed version string of the application is 1.5.2. The minimum Android API level for the application to run (MinSDKVersion) is 3.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.DISABLE_KEYGUARD (disable key lock)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.INTERNET (full Internet access)
Activities
com.tutusw.fingerscanner.SettingsActivity
com.tutusw.fingerscanner.FingerprintActivity
com.tutusw.fingerscanner.HelpActivity
com.eguan.state.Dialog
Services
com.eguan.state.StateService
com.tutusw.fingerscanner.SleepService
Receivers
com.eguan.state.Receiver
com.tutusw.fingerscanner.BootReceiver
Activity-related intent filters
com.tutusw.fingerscanner.SettingsActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.tutusw.fingerscanner.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
com.eguan.state.Receiver
actions: android.intent.action.BATTERY_CHANGED_ACTION, android.intent.action.SIG_STR, android.intent.action.BOOT_COMPLETED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
38
Uncompressed size
786004
Highest datetime
2014-02-23 19:00:30
Lowest datetime
2014-02-23 19:00:30
Contained files by extension
jpg
19
xml
6
ogg
2
png
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
JPG
19
XML
6
unknown
5
ELF
3
OGG
2
PNG
2
DEX
1
File identification
MD5 ce356a958c17ea98c5ff1d4bb442d069
SHA1 539b0ab6bf66183a0603dc8fd39c8d66d6a4e92b
SHA256 dfefb992a19b3e98725f8aa5d724384f6faf1549882bc5ac3969601f82927077
ssdeep
12288:3NZACzo3FfdOPhvx8QLSs2PzVQ4HOoujATkS7RVuCFAxRmYvH:3iFfPTZQ8+iks3XAxR7vH

File size 709.5 KB ( 726482 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2017-03-15 10:35:23 UTC ( 7 months, 1 week ago )
Last submission 2017-03-15 10:35:23 UTC ( 7 months, 1 week ago )
File names myfile.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!