× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 013fa8952d079039a847933cb41a377d5d9757807c4cc2ce7be21df4e16af5c6
File name: alien-creeps-td-1.11.1.apk
Detection ratio: 0 / 57
Analysis date: 2016-05-14 13:35:52 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160514
AegisLab 20160514
AhnLab-V3 20160513
Alibaba 20160513
ALYac 20160514
Antiy-AVL 20160514
Arcabit 20160514
Avast 20160514
AVG 20160514
Avira (no cloud) 20160514
AVware 20160511
Baidu 20160514
Baidu-International 20160514
BitDefender 20160514
Bkav 20160514
CAT-QuickHeal 20160514
ClamAV 20160514
CMC 20160510
Comodo 20160514
Cyren 20160514
DrWeb 20160514
Emsisoft 20160514
ESET-NOD32 20160514
F-Prot 20160514
F-Secure 20160514
Fortinet 20160514
GData 20160514
Ikarus 20160514
Jiangmin 20160514
K7AntiVirus 20160514
K7GW 20160514
Kaspersky 20160514
Kingsoft 20160514
Malwarebytes 20160514
McAfee 20160514
McAfee-GW-Edition 20160514
Microsoft 20160514
eScan 20160514
NANO-Antivirus 20160514
nProtect 20160513
Panda 20160514
Qihoo-360 20160514
Rising 20160514
Sophos AV 20160514
SUPERAntiSpyware 20160514
Symantec 20160514
Tencent 20160514
TheHacker 20160513
TotalDefense 20160512
TrendMicro 20160514
TrendMicro-HouseCall 20160514
VBA32 20160513
VIPRE 20160514
ViRobot 20160514
Yandex 20160513
Zillya 20160514
Zoner 20160514
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.outplayentertainment.aliencreeps. The internal version number of the application is 10110001. The displayed version string of the application is 1.11.1. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
com.outplayentertainment.aliencreeps.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.vungle.publisher.FullScreenAdActivity
com.outplayentertainment.aliencreeps.AlienCreepsActivity
com.facebook.FacebookActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.google.android.gms.analytics.CampaignTrackingService
com.outplayentertainment.cocoskit.localnotification.LocalNotificationPosterService
Receivers
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
com.outplayentertainment.ogk.InstallReceiver
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
Activity-related intent filters
com.outplayentertainment.aliencreeps.AlienCreepsActivity
actions: android.intent.action.MAIN, com.facebook.SSO_WITH_FALLBACK, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
actions: android.net.conn.CONNECTIVITY_CHANGE
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.outplayentertainment.aliencreeps
com.outplayentertainment.ogk.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1162
Uncompressed size
78090617
Highest datetime
2015-11-06 14:30:14
Lowest datetime
2015-11-06 11:57:48
Contained files by extension
png
273
map
135
tsv
30
fnt
8
m4a
8
xml
6
bin
2
jpg
2
ckb
1
css
1
Contained files by type
unknown
408
PNG
273
XML
212
JSON
100
HTML
5
JPG
2
File identification
MD5 6eb4ce225d1ae5c430e440d151c1b596
SHA1 3446bd62e9c0a99195b4171cdb99daf98d846a32
SHA256 013fa8952d079039a847933cb41a377d5d9757807c4cc2ce7be21df4e16af5c6
ssdeep
1572864:xqGB/uxJQ4asLPPnJUK7lRun2399Dr0Zc9/8JAanftGyX7jSPoMsgPn:xqYmjBauxRuY99MW9/8+0flXD2

File size 72.5 MB ( 76054001 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk android

VirusTotal metadata
First submission 2015-11-06 23:08:13 UTC ( 3 years, 2 months ago )
Last submission 2018-09-26 03:35:35 UTC ( 3 months, 3 weeks ago )
File names com.outplayentertainment.aliencreeps-3.apk
base.apk
alien-creeps-td.apk
alien-creeps-td-1.11.1.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.outplayentertainment.aliencreeps/files/AdjustAttribution
/data/data/com.outplayentertainment.aliencreeps/files/AdjustIoActivityState
/data/data/com.outplayentertainment.aliencreeps/files/AdjustIoPackageQueue
/data/data/com.outplayentertainment.aliencreeps/files/AppEventsLogger.persistedevents
/data/data/com.outplayentertainment.aliencreeps/files/AppEventsLogger.persistedsessioninfo
/data/data/com.outplayentertainment.aliencreeps/files/gaClientId
/sys/devices/system/cpu
/data/data/com.outplayentertainment.aliencreeps/files
/mnt/sdcard
Deleted files
/data/data/com.outplayentertainment.aliencreeps/filesAppEventsLogger.persistedsessioninfo
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
https://app.adjust.com/session
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
https://graph.facebook.com/v2.5/568793059903593?format=json&sdk=android&fields=supports_implicit_sdk_logging%2Cgdpv4_nux_content%2Cgdpv4_nux_enabled%2Candroid_dialog_configs%2Candroid_sdk_error_categories
https://graph.facebook.com/v2.5/568793059903593/activities?format=json&sdk=android
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
content://com.facebook.katana.provider.PlatformProvider/versions
content://com.facebook.wakizashi.provider.PlatformProvider/versions