× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fcb5d6e3a0c7837246389e73824f86c07e2e02cc7a7c1b68cf27ab404465907f
File name: Adobe_Flash_Playe.apk
Detection ratio: 26 / 56
Analysis date: 2015-07-28 16:36:30 UTC ( 3 years, 3 months ago )
Antivirus Result Update
Ad-Aware Android.Trojan.AndroRAT.E 20150728
AegisLab Sandr 20150728
AhnLab-V3 Android-Trojan/Sandrorat.c542 20150728
Alibaba A.W.Rog.EvilCert.A24 20150728
Antiy-AVL Trojan[Spy:HEUR]/AndroidOS.Sandr.1 20150728
Arcabit Android.Trojan.AndroRAT.E 20150728
Avast Android:Kasandra-E [Trj] 20150728
AVG Android/Deng.LAF 20150728
Avira (no cloud) ANDROID/Spy.Kasandra.A.Gen 20150728
Baidu-International Trojan.AndroidOS.Sandr.a 20150728
BitDefender Android.Trojan.AndroRAT.E 20150728
CAT-QuickHeal Android.Sandr.A 20150728
Cyren AndroidOS/Sandr.A.gen!Eldorado 20150728
DrWeb Android.Spy.178.origin 20150728
Emsisoft Android.Trojan.AndroRAT.E (B) 20150728
ESET-NOD32 a variant of Android/Spy.Kasandra.C 20150728
F-Secure Android.Trojan.AndroRAT.E 20150728
Fortinet Android/Sandr.C!tr 20150728
GData Android.Trojan.AndroRAT.E 20150728
Ikarus Spyware.AndroidOS.Kasandra 20150728
Kaspersky HEUR:Trojan-Spy.AndroidOS.Sandr.a 20150728
McAfee Artemis!54EF44261215 20150728
McAfee-GW-Edition Artemis 20150728
eScan Android.Trojan.AndroRAT.E 20150728
NANO-Antivirus Trojan.Android.Zerat.dekxmy 20150728
Sophos AV Andr/SandRat-C 20150728
Yandex 20150728
ALYac 20150728
AVware 20150728
Bkav 20150728
ByteHero 20150728
ClamAV 20150728
Comodo 20150728
F-Prot 20150728
Jiangmin 20150727
K7AntiVirus 20150728
K7GW 20150728
Kingsoft 20150728
Malwarebytes 20150728
Microsoft 20150728
nProtect 20150728
Panda 20150728
Qihoo-360 20150728
Rising 20150728
SUPERAntiSpyware 20150728
Symantec 20150728
Tencent 20150728
TheHacker 20150727
TotalDefense 20150728
TrendMicro 20150728
TrendMicro-HouseCall 20150728
VBA32 20150728
VIPRE 20150728
ViRobot 20150728
Zillya 20150728
Zoner 20150728
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.droidjack.server. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 17.
Risk summary
The studied DEX file makes use of API reflection
The studied DEX file makes use of cryptographic functions
Permissions that allow the application to manipulate SMS
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_CALL_LOG (write (but not read) the user's contacts data.)
android.permission.GET_TASKS (retrieve running applications)
android.permission.READ_CALL_LOG (read the user's call log.)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECORD_AUDIO (record audio)
android.permission.WRITE_CONTACTS (write contact data)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_CONTACTS (read contact data)
Permission-related API calls
FACTORY_TEST
GET_TASKS
ACCESS_NETWORK_STATE
RECORD_AUDIO
READ_LOGS
SEND_SMS
ACCESS_WIFI_STATE
CAMERA
INTERNET
READ_CONTACTS
CHANGE_COMPONENT_ENABLED_STATE
READ_PHONE_STATE
WRITE_HISTORY_BOOKMARKS
ACCESS_FINE_LOCATION
WAKE_LOCK
Main Activity
net.droidjack.server.MainActivity
Activities
net.droidjack.server.MainActivity
net.droidjack.server.CamSnapDJ
net.droidjack.server.VideoCapDJ
net.droidjack.server.CamSnapDJ
net.droidjack.server.VideoCapDJ
Services
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
net.droidjack.server.Controller
net.droidjack.server.GPSLocation
net.droidjack.server.Toaster
Receivers
net.droidjack.server.Connector
net.droidjack.server.CallListener
net.droidjack.server.Connector
net.droidjack.server.CallListener
Activity-related intent filters
net.droidjack.server.VideoCapDJ
actions: android.intent.action.VIDEOCAPDJ
categories: android.intent.category.DEFAULT
net.droidjack.server.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
net.droidjack.server.CamSnapDJ
actions: android.intent.action.CAMSNAPDJ
categories: android.intent.category.DEFAULT
Receiver-related intent filters
net.droidjack.server.Connector
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.BOOT_COMPLETED
net.droidjack.server.CallListener
actions: android.intent.action.PHONE_STATE
Application certificate information
Application bundle files
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
12
Uncompressed size
576786
Highest datetime
2015-07-08 17:16:38
Lowest datetime
2015-07-08 17:16:36
Contained files by extension
xml
4
png
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
XML
4
unknown
4
PNG
3
DEX
1
File identification
MD5 54ef44261215b73f66a42177aa1ecb70
SHA1 c8c22ba8ad233994787a576efc14ee4f7976980a
SHA256 fcb5d6e3a0c7837246389e73824f86c07e2e02cc7a7c1b68cf27ab404465907f
ssdeep
6144:qW9a9mspl0/3P3nvceeN9A1zFrpPnY0fC53O4:q9hl033vcUzrpPnJuO4

File size 236.6 KB ( 242306 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android

VirusTotal metadata
First submission 2015-07-10 15:16:15 UTC ( 3 years, 4 months ago )
Last submission 2015-07-10 15:16:15 UTC ( 3 years, 4 months ago )
File names Adobe_Flash_Playe.apk
3DXT.mht
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;component=net.droidjack.server/.Controller;end