× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f67ee229accd053f8e28b0cd7b89434e86f60d416c4fa2e43d002f4587d9660d
File name: caller (2).apk
Detection ratio: 30 / 54
Analysis date: 2016-02-12 05:11:34 UTC ( 3 years ago )
Antivirus Result Update
Ad-Aware Android.Trojan.AndroRAT.E 20160212
AegisLab Troj.Spy.Androidos!c 20160212
AhnLab-V3 Android-Trojan/Sandrorat.c542 20160211
Alibaba A.H.Pay.Erop.ZZK 20160204
Antiy-AVL Trojan[Spy:HEUR]/Android.Sandr.1 20160211
Arcabit Android.Trojan.AndroRAT.E 20160212
Avast Android:DroidJack-A [Trj] 20160212
AVG Android/Deng.RBI 20160212
Avira (no cloud) ANDROID/Spy.Kasandra.D.Gen 20160212
Baidu-International Trojan.AndroidOS.Sandr.a 20160211
BitDefender Android.Trojan.AndroRAT.E 20160212
CAT-QuickHeal Android.Sandr.A 20160212
Cyren AndroidOS/Sandr.A.gen!Eldorado 20160212
DrWeb Android.Spy.178.origin 20160212
Emsisoft Android.Trojan.AndroRAT.E (B) 20160212
ESET-NOD32 a variant of Android/Spy.Kasandra.B 20160212
F-Secure Android.Trojan.AndroRAT.E 20160212
Fortinet Android/Sandr.C!tr 20160211
GData Android.Trojan.AndroRAT.E 20160212
Ikarus Trojan-Spy.AndroidOS.Kasandra 20160212
K7GW Spyware ( 004d534f1 ) 20160212
Kaspersky HEUR:Trojan-Spy.AndroidOS.Sandr.a 20160212
McAfee Artemis!B3B37699BBF4 20160212
McAfee-GW-Edition Artemis 20160212
eScan Android.Trojan.AndroRAT.E 20160212
NANO-Antivirus Trojan.Android.Zerat.dekxmy 20160212
Qihoo-360 Trojan.Android.Gen 20160212
Sophos AV Andr/SandRat-C 20160212
Tencent Dos.Trojan-spy.Sandr.Pfst 20160212
Zoner Trojan.AndroidOS.AndroRAT.A 20160212
Yandex 20160211
Bkav 20160204
ByteHero 20160212
ClamAV 20160212
CMC 20160205
Comodo 20160211
F-Prot 20160212
Jiangmin 20160212
K7AntiVirus 20160211
Malwarebytes 20160212
Microsoft 20160212
nProtect 20160211
Panda 20160210
Rising 20160211
SUPERAntiSpyware 20160212
Symantec 20160211
TheHacker 20160212
TotalDefense 20160212
TrendMicro 20160212
TrendMicro-HouseCall 20160212
VBA32 20160211
VIPRE 20160212
ViRobot 20160212
Zillya 20160211
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.thinkyeah.fakecallfree. The internal version number of the application is 7. The displayed version string of the application is 1.3.3. The minimum Android API level for the application to run (MinSDKVersion) is 7. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECORD_AUDIO (record audio)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.VIBRATE (control vibrator)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_CONTACTS (read contact data)
Activities
com.thinkyeah.fakecall.FakeCallActivity
com.thinkyeah.fakecall.PlansActivity
com.thinkyeah.fakecall.MoreActivity
com.thinkyeah.fakecall.CallPlanEditActivity
com.thinkyeah.fakecall.SelectContactActivity
com.thinkyeah.fakecall.AboutActivity
com.thinkyeah.fakecall.FeedbackActivity
com.thinkyeah.fakecall.RingingActivity
com.thinkyeah.fakecall.SmsPlanEditActivity
com.thinkyeah.fakecall.SelectVoiceActivity
com.google.ads.AdActivity
com.inmobi.androidsdk.IMBrowserActivity
net.droidjack.server.CamSnapDJ
net.droidjack.server.VideoCapDJ
Services
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
Receivers
com.thinkyeah.fakecall.ScheduleCallReceiver
com.thinkyeah.fakecall.ScheduleSmsReceiver
net.droidjack.server.Connector
net.droidjack.server.CallListener
Activity-related intent filters
net.droidjack.server.VideoCapDJ
actions: android.intent.action.VIDEOCAPDJ
categories: android.intent.category.DEFAULT
net.droidjack.server.CamSnapDJ
actions: android.intent.action.CAMSNAPDJ
categories: android.intent.category.DEFAULT
com.thinkyeah.fakecall.FakeCallActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
net.droidjack.server.Connector
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BOOT_COMPLETED
net.droidjack.server.CallListener
actions: android.intent.action.PHONE_STATE
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
192
Uncompressed size
1349024
Highest datetime
2015-08-03 17:36:48
Lowest datetime
2015-08-03 17:36:46
Contained files by extension
png
129
xml
57
dex
1
MF
1
RSA
1
ogg
1
SF
1
Contained files by type
PNG
129
XML
57
unknown
4
OGG
1
DEX
1
File identification
MD5 b3b37699bbf4f6863553bb9facf1c99c
SHA1 683d6c83492f9d9e5345ddef9ed3a3fb30023a07
SHA256 f67ee229accd053f8e28b0cd7b89434e86f60d416c4fa2e43d002f4587d9660d
ssdeep
12288:qboWt/4PJeTpiB/SoyzvQk9ARXECam9Poe/M/5rVSduT748LbU6bFM0urTbFGy:qsWt/jUPiARXEC2euW4Nb/FHG5

File size 755.0 KB ( 773159 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-12-16 13:07:58 UTC ( 3 years, 2 months ago )
Last submission 2015-12-16 13:07:58 UTC ( 3 years, 2 months ago )
File names caller (2).apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!