× Les galetes no estan habilitades Aquest web requereix l'ús de galetes per funcionar correctament
SHA256: 3d2ae05ee1655ea47769fda4de3c99a6a9b7c6760d3fedccd51058523d8448a5
Nom del fitxer: base.apk
Relació de detecció: 0 / 62
Data de l'anàlisi: 2017-11-24 22:43:05 UTC ( fa 1 any, 6 mesos ) Mostra el darrer
Antivirus Resultat Actualitzat el
Ad-Aware 20171124
AegisLab 20171124
AhnLab-V3 20171124
Alibaba 20171124
ALYac 20171124
Antiy-AVL 20171124
Arcabit 20171124
Avast 20171124
Avast-Mobile 20171124
AVG 20171124
Avira (no cloud) 20171124
AVware 20171124
Baidu 20171124
BitDefender 20171124
Bkav 20171124
CAT-QuickHeal 20171124
ClamAV 20171124
CMC 20171124
Comodo 20171124
CrowdStrike Falcon (ML) 20171016
Cybereason None
Cylance 20171124
Cyren 20171124
DrWeb 20171124
eGambit 20171124
Emsisoft 20171124
Endgame 20171024
ESET-NOD32 20171124
F-Prot 20171124
F-Secure 20171124
Fortinet 20171124
GData 20171124
Ikarus 20171124
Sophos ML 20170914
Jiangmin 20171124
K7AntiVirus 20171124
K7GW 20171124
Kaspersky 20171124
Kingsoft 20171124
Malwarebytes 20171124
MAX 20171124
McAfee 20171124
McAfee-GW-Edition 20171124
Microsoft 20171124
eScan 20171124
NANO-Antivirus 20171124
nProtect 20171124
Palo Alto Networks (Known Signatures) 20171124
Panda 20171124
Qihoo-360 20171124
Rising 20171124
SentinelOne (Static ML) 20171113
Sophos AV 20171124
SUPERAntiSpyware 20171124
Symantec 20171124
Symantec Mobile Insight 20171123
Tencent 20171124
TheHacker 20171121
TrendMicro-HouseCall 20171124
Trustlook 20171124
VBA32 20171124
VIPRE 20171124
ViRobot 20171124
Webroot 20171124
WhiteArmor 20171104
Yandex 20171120
Zillya 20171124
ZoneAlarm by Check Point 20171124
Zoner 20171124
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aag.underworld.stickmafia. The internal version number of the application is 21. The displayed version string of the application is 3.0. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
Activities
com.unity3d.player.UnityPlayerActivity
com.prime31.GoogleIABProxyActivity
com.google.games.bridge.NativeBridgeActivity
com.millennialmedia.internal.MMActivity
com.millennialmedia.internal.MMIntentWrapperActivity
com.tapdaq.sdk.TMTestActivity
com.tapdaq.sdk.TMTestNativeActivity
com.tapdaq.sdk.TMInterstitialActivity
com.tapdaq.sdk.TMVideoInterstitialActivity
com.tapdaq.sdk.TMMoreAppsActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.tapdaq.sdk.adnetworks.adcolony.ACVideoActivity
com.tapdaq.sdk.adnetworks.adcolony.ACWebActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.InterstitialAdActivity
com.inmobi.rendering.InMobiAdActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
Receivers
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
net.agasper.unitynotification.UnityNotificationManager
Providers
com.google.firebase.provider.FirebaseInitProvider
Activity-related intent filters
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
actions: com.inmobi.share.id
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
560
Uncompressed size
259538825
Highest datetime
2017-11-23 18:26:04
Lowest datetime
1980-01-01 05:00:00
Contained files by extension
png
142
xml
73
dll
29
so
6
js
4
zip
2
dex
1
MF
1
mdb
1
RSA
1
SF
1
Contained files by type
unknown
307
PNG
142
XML
73
Portable Executable
29
ELF
6
ZIP
2
DEX
1
File identification
MD5 b7549220e17f59bf3a29ce9a69340128
SHA1 e2536202087c3d5fd4d2d35c0ff2c4f2bf80dbf0
SHA256 3d2ae05ee1655ea47769fda4de3c99a6a9b7c6760d3fedccd51058523d8448a5
ssdeep
1572864:buibyyBUbanJw0ms0swfKWwQQlzUX8N6gP0C5YA37obXUm5wGZiqOJhei3Np8DoK:lxBoaJp0swfxuU40Ixrobkswsi1Jhn/A

Mida del fitxer 73.9 MB ( 77459735 bytes )
Tipus de fitxer Android
Informació avançada
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-11-24 22:43:05 UTC ( fa 1 any, 6 mesos )
Last submission 2018-10-11 05:52:37 UTC ( fa 7 mesos, 2 setmanes )
Noms de fitxer aosmwiPw8ZRpcleUmDnZiPgyhg4l1p2X6BW4JTvNOGAhS07iClRg
assarcGHIKnWOpGI0kaaRQlI4LMJ6DHhmBMZGG
com.aag.underworld.stickmafia.apk
base.apk
ossaw39gDbKnKTM3S4V86f6ocVsMcAOrmAGPjkKezY
asmaC7M7ftGksNayAqxWAWx
Cap comentari. Cap membre ha fet un comentari, però podeu ser la primera persona en fer-ho!

Afegiu un comentari...

?
Publica el comentari

No heu iniciat una sessió. Només els usuaris registrats poden publicar comentaris. Inicieu la sessió i tindreu veu i vot!

Cap vot. Cap membre ha fet una votació, però podeu ser la primera persona en fer-ho!