× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0468aba8a4020928119c9af4c62aa0905fa7a67ed8e8e3a7ac0a59d43a6b0a63
File name: com.nexonm.loh.usios-1.5.02-APK4Fun.com.apk
Detection ratio: 0 / 55
Analysis date: 2016-02-21 09:42:39 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160221
AegisLab 20160221
Yandex 20160220
AhnLab-V3 20160220
Alibaba 20160221
Antiy-AVL 20160220
Arcabit 20160221
Avast 20160221
AVG 20160221
Avira (no cloud) 20160220
AVware 20160221
Baidu-International 20160221
BitDefender 20160221
Bkav 20160220
ByteHero 20160221
CAT-QuickHeal 20160220
ClamAV 20160221
CMC 20160219
Comodo 20160221
Cyren 20160221
DrWeb 20160221
Emsisoft 20160221
ESET-NOD32 20160221
F-Prot 20160221
F-Secure 20160219
Fortinet 20160220
GData 20160221
Ikarus 20160221
Jiangmin 20160221
K7AntiVirus 20160221
K7GW 20160221
Kaspersky 20160221
Malwarebytes 20160221
McAfee 20160221
McAfee-GW-Edition 20160220
Microsoft 20160221
eScan 20160221
NANO-Antivirus 20160221
nProtect 20160219
Panda 20160221
Qihoo-360 20160221
Rising 20160221
Sophos AV 20160221
SUPERAntiSpyware 20160221
Symantec 20160219
Tencent 20160221
TheHacker 20160217
TotalDefense 20160221
TrendMicro 20160221
TrendMicro-HouseCall 20160221
VBA32 20160220
VIPRE 20160221
ViRobot 20160221
Zillya 20160219
Zoner 20160221
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1502. The displayed version string of the application is 1.5.02. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.facebook.LoginActivity
com.prime31.FacebookProxyActivity
com.prime31.GoogleIABProxyActivity
com.google.example.games.pluginsupport.SignInHelperActivity
com.google.example.games.pluginsupport.SelectOpponentsHelperActivity
com.google.example.games.pluginsupport.InvitationInboxHelperActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
io.fiverocks.android.InstallReferrerReceiver
Activity-related intent filters
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
io.fiverocks.android.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
955
Uncompressed size
121544948
Highest datetime
2015-04-23 23:17:02
Lowest datetime
2015-03-05 02:44:46
Contained files by extension
png
210
xml
44
dll
17
so
6
dex
1
MF
1
RSA
1
mp4
1
SF
1
Contained files by type
unknown
676
PNG
210
XML
44
Portable Executable
17
ELF
6
DEX
1
MP3
1
File identification
MD5 3b9d38bf4e81a1b4b1c2bd40f030a52a
SHA1 622e84fd7e401038cf25a8781ac9ed25b48228a9
SHA256 0468aba8a4020928119c9af4c62aa0905fa7a67ed8e8e3a7ac0a59d43a6b0a63
ssdeep
786432:/YvHvZVf6oLLU/m0EbbL3imfyE1g7nY0+XSpwp+YitcICytg4xROHbf17GB:cHvZIgSm0yL3imqHzY0+XOwp+zCytbAo

File size 41.2 MB ( 43201882 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe contains-elf android software-collection

VirusTotal metadata
First submission 2015-04-24 18:14:53 UTC ( 3 years, 12 months ago )
Last submission 2016-10-12 03:15:26 UTC ( 2 years, 6 months ago )
File names com.nexonm.loh.usios-1.5.02-APK4Fun.com.apk
legion-of-heroes.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!