× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 07f9ec41ee2416167e5a8481946ce33fa342f92d5fdff07f6c7363178050406d
File name: 18-1355-1465581841-22649.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-10 18:04:25 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160610
AegisLab 20160610
AhnLab-V3 20160610
Alibaba 20160608
ALYac 20160610
Antiy-AVL 20160610
Arcabit 20160610
Avast 20160610
AVG 20160610
Avira (no cloud) 20160610
AVware 20160610
Baidu 20160608
Baidu-International 20160606
BitDefender 20160610
Bkav 20160610
CAT-QuickHeal 20160610
ClamAV 20160610
CMC 20160607
Comodo 20160610
Cyren 20160610
DrWeb 20160610
Emsisoft 20160610
ESET-NOD32 20160610
F-Prot 20160610
F-Secure 20160610
Fortinet 20160610
GData 20160610
Ikarus 20160610
Jiangmin 20160610
K7AntiVirus 20160610
K7GW 20160610
Kaspersky 20160610
Kingsoft 20160610
Malwarebytes 20160610
McAfee 20160610
McAfee-GW-Edition 20160610
Microsoft 20160610
eScan 20160610
NANO-Antivirus 20160610
nProtect 20160610
Panda 20160610
Qihoo-360 20160610
Rising 20160610
Sophos AV 20160610
SUPERAntiSpyware 20160610
Symantec 20160610
Tencent 20160610
TheHacker 20160610
TotalDefense 20160610
TrendMicro 20160610
TrendMicro-HouseCall 20160610
VBA32 20160610
VIPRE 20160610
ViRobot 20160610
Yandex 20160609
Zillya 20160609
Zoner 20160610
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.oddrok.powerhover. The internal version number of the application is 62. The displayed version string of the application is 1.4.9. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerActivity
com.androidnative.AndroidNativeProxy
com.androidnative.billing.core.AN_BillingProxyActivity
com.androidnative.gms.core.GooglePlaySupportActivity
com.google.android.gms.ads.AdActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
com.vungle.publisher.FullScreenAdActivity
com.chartboost.sdk.CBImpressionActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.vungle.publisher.VungleService
Activity-related intent filters
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LEANBACK_LAUNCHER, android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
430
Uncompressed size
158122676
Highest datetime
2016-04-27 23:28:02
Lowest datetime
2016-03-11 01:52:42
Contained files by extension
dll
32
xml
15
png
14
so
6
dex
1
MF
1
mdb
1
RSA
1
mp4
1
SF
1
Contained files by type
unknown
362
Portable Executable
32
XML
15
PNG
14
ELF
6
DEX
1
File identification
MD5 b7aae0297f351d6880d2c71675117d59
SHA1 d9786a028ce328a89a385fef5fceb943b6b37e5a
SHA256 07f9ec41ee2416167e5a8481946ce33fa342f92d5fdff07f6c7363178050406d
ssdeep
1572864:O9PVnsjsNEvd9dJSHn+Ap62O2AUXUgzi6fea/ad6QUJvK4EQaE:OZi42l9dJSL62O2BbeBkQivK4zd

File size 57.5 MB ( 60315848 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2016-04-29 05:53:02 UTC ( 2 years, 8 months ago )
Last submission 2018-12-11 10:06:59 UTC ( 1 month, 1 week ago )
File names 1420-b7aae0297f351d6880d2c71675117d59-1462699199.apk
592825_8a695f_power_hover_1.4.9.apk
18-1355-1482413281-99221.apk
1463042955_com.oddrok.powerhover.apk
base.apk
com.oddrok.powerhover-2.apk
power-hover.apk
18-1355-1465581841-22649.apk
1462001083_com.oddrok.powerhover.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.oddrok.powerhover-1.apk/assets/bin/Data/settings.xml