Attend XDA's Second Annual Developer Conference, XDA:DevCon 2014!
5,781,459 Members 39,613 Now Online
XDA Developers Android and Mobile Development Forum

SuperSu and Andr.Exploit.Ratc

Tip us?
 
heartbroke
Old
#1  
Junior Member - OP
Thanks Meter 1
Posts: 5
Join Date: Apr 2014
Default SuperSu and Andr.Exploit.Ratc

So today i just download SuperSU v1.94 from here (pls remove "[ ]")
Code:
download.chainfire.[eu]/396/SuperSU/UPDATE-SuperSU-v1.94.zip
After downloading that .zip i scan at Virustotal which give me this result (pls remove "[ ]")
Code:
virustotal.[com]/en/file/611837921155897108f470be1777753fea4c8a4b6ec6ce6148eec635f2826f31/analysis/1397049074/
Detection ratio: 1 / 51
And this file contain Andr.Exploit.Ratc

Is it safe to download?

I need help.
Attached Thumbnails
Click image for larger version

Name:	4-9-2014 7-22-44 AM.png
Views:	327
Size:	7.9 KB
ID:	2676727  
 
ShadowTehAmazing
Old
#2  
ShadowTehAmazing's Avatar
Junior Member
Thanks Meter 4
Posts: 13
Join Date: Apr 2014
nice thanks im updating it now
 
nirmalkurienmathews
Old
#3  
nirmalkurienmathews's Avatar
Junior Member
Thanks Meter 0
Posts: 8
Join Date: Mar 2014
Location: Bangalore
Default False Positive

It is definitely false positive as the app uses root exploit and moreover the the particular exploit RageAgainstTheCage is defined as a forked child instance which is safe to execute as it will automatically dies after the parent process is killed.

We can see this same threat gets detected by ClamAV across all SuperSu apks.
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes