× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 030cb165e00e587cd0b74ca2a48e3b4927319c37455c666ed62de8dbec094b0f
File name: clash-royale.apk
Detection ratio: 0 / 58
Analysis date: 2019-02-02 08:27:54 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
Acronis 20190130
Ad-Aware 20190202
AegisLab 20190202
AhnLab-V3 20190201
Alibaba 20180921
Antiy-AVL 20190202
Arcabit 20190202
Avast 20190202
Avast-Mobile 20190202
AVG 20190202
Avira (no cloud) 20190202
Babable 20180918
Baidu 20190202
BitDefender 20190202
Bkav 20190201
CAT-QuickHeal 20190201
ClamAV 20190201
CMC 20190201
Comodo 20190202
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190202
Cyren 20190202
DrWeb 20190202
eGambit 20190202
Emsisoft 20190202
Endgame 20181108
ESET-NOD32 20190202
F-Prot 20190202
F-Secure 20190202
Fortinet 20190201
GData 20190202
Ikarus 20190201
Sophos ML 20181128
Jiangmin 20190202
K7AntiVirus 20190202
K7GW 20190202
Kaspersky 20190202
Kingsoft 20190202
Malwarebytes 20190202
MAX 20190202
McAfee 20190202
McAfee-GW-Edition 20190201
Microsoft 20190202
eScan 20190202
NANO-Antivirus 20190202
Palo Alto Networks (Known Signatures) 20190202
Panda 20190201
Qihoo-360 20190202
Rising 20190202
SentinelOne (Static ML) 20190124
Sophos AV 20190202
SUPERAntiSpyware 20190130
Symantec 20190202
TACHYON 20190202
Tencent 20190202
TheHacker 20190131
TotalDefense 20190202
Trapmine 20190123
TrendMicro 20190202
TrendMicro-HouseCall 20190202
Trustlook 20190202
VBA32 20190201
ViRobot 20190201
Webroot 20190202
Yandex 20190201
Zillya 20190201
ZoneAlarm by Check Point 20190202
Zoner 20190202
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.supercell.clashroyale. The internal version number of the application is 336. The displayed version string of the application is 2.5.3. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.supercell.clashroyale.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.FOREGROUND_SERVICE (Unknown permission from android reference)
com.farsitel.bazaar.permission.PAY_THROUGH_BAZAAR (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.supercell.clashroyale.GameApp
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.google.android.gms.common.api.GoogleApiActivity
com.helpshift.support.activities.ParentActivity
com.helpshift.support.HSReview
Services
com.supercell.clashroyale.GCMIntentService
Receivers
com.supercell.clashroyale.TimeAlarm
com.google.android.gcm.GCMBroadcastReceiver
com.mobileapptracker.Tracker
Providers
com.facebook.internal.FacebookInitProvider
com.helpshift.support.providers.HelpshiftFileProvider
Activity-related intent filters
com.supercell.clashroyale.GameApp
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.mobileapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.supercell.clashroyale
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1909
Uncompressed size
88591493
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
wav
591
sc
183
csv
124
ktx
29
png
22
ogg
16
scw
6
ttf
4
xml
1
MF
1
fsh
1
RSA
1
fnt
1
vsh
1
SF
1
Contained files by type
unknown
960
PNG
22
OGG
16
XML
1
JSON
1
File identification
MD5 a3312c351f7fe067d6a904833595dab3
SHA1 b2e4611ce5d7fe4523e11cae236ef1ba5caa0ad9
SHA256 030cb165e00e587cd0b74ca2a48e3b4927319c37455c666ed62de8dbec094b0f
ssdeep
3145728:DlqT1dz5Wep6OjLz6TsaPLbnnGHLWq//bRd5f0:DlS55wOLz6TPbnXq//bRd5f0

File size 101.5 MB ( 106401062 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (46.6%)
SPSS Extension (26.6%)
Java Archive (12.8%)
Sweet Home 3D design (generic) (9.3%)
ZIP compressed archive (3.5%)
Tags
apk android

VirusTotal metadata
First submission 2019-02-02 08:27:54 UTC ( 1 month, 3 weeks ago )
Last submission 2019-02-02 08:27:54 UTC ( 1 month, 3 weeks ago )
File names clash-royale.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!