× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0e714fce55aae3b9c60cc3862c2709707f4c8c01588a667ec643045e4ce305f3
File name: 828747_46e1b6_com.igg.android.lordsmobile-94.apk
Detection ratio: 0 / 58
Analysis date: 2017-05-07 10:10:57 UTC ( 1 year, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170507
AegisLab 20170507
AhnLab-V3 20170506
Alibaba 20170505
ALYac 20170507
Antiy-AVL 20170507
Arcabit 20170507
Avast 20170507
AVG 20170507
Avira (no cloud) 20170507
AVware 20170507
Baidu 20170503
BitDefender 20170507
CAT-QuickHeal 20170506
ClamAV 20170507
CMC 20170506
Comodo 20170507
CrowdStrike Falcon (ML) 20170130
Cyren 20170507
DrWeb 20170507
Emsisoft 20170507
Endgame 20170503
ESET-NOD32 20170507
F-Prot 20170507
F-Secure 20170507
Fortinet 20170507
GData 20170507
Ikarus 20170507
Sophos ML 20170413
Jiangmin 20170507
K7AntiVirus 20170506
K7GW 20170507
Kaspersky 20170507
Kingsoft 20170507
Malwarebytes 20170507
McAfee 20170507
McAfee-GW-Edition 20170506
Microsoft 20170507
eScan 20170507
NANO-Antivirus 20170507
nProtect 20170507
Palo Alto Networks (Known Signatures) 20170507
Panda 20170507
Qihoo-360 20170507
Rising 20170506
SentinelOne (Static ML) 20170330
Sophos AV 20170507
SUPERAntiSpyware 20170507
Symantec 20170506
Symantec Mobile Insight 20170504
Tencent 20170507
TheHacker 20170505
TotalDefense 20170507
Trustlook 20170507
VBA32 20170506
VIPRE 20170507
ViRobot 20170506
Webroot 20170507
WhiteArmor 20170502
Yandex 20170504
Zillya 20170505
ZoneAlarm by Check Point 20170507
Zoner 20170507
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.igg.android.lordsmobile. The internal version number of the application is 94. The displayed version string of the application is 1.42. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.igg.android.lordsmobile.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.igg.iggsdkbusiness.IGGSDKPlugin
com.unity3d.player.VideoPlayer
com.outlinegames.unibill.PurchaseActivity
com.igg.iggsdkbusiness.IGGWebView
com.igg.iggsdkbusiness.TapjoyView
com.prime31.ReauthorizationProxy
com.facebook.FacebookActivity
com.igg.android.wegamers.auth.AuthActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
Services
com.igg.iggsdkbusiness.GCMIntentService
com.unity3d.plugin.downloader.UnityDownloaderService
Receivers
com.igg.iggsdkbusiness.GCMBroadcastReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.igg.iggsdkbusiness.LocalNotificationReceiver
com.igg.iggsdkbusiness.AuthRequestReceiver
com.unity3d.plugin.downloader.UnityAlarmReceiver
Activity-related intent filters
com.igg.android.wegamers.auth.AuthActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.igg.iggsdkbusiness.IGGSDKPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.igg.iggsdkbusiness.AuthRequestReceiver
actions: com.igg.android.game.authreceiver
com.igg.iggsdkbusiness.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.igg.android.lordsmobile
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
477
Uncompressed size
33720797
Highest datetime
2017-05-03 18:20:24
Lowest datetime
2015-08-28 10:44:10
Contained files by extension
png
319
xml
137
dll
7
so
5
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
319
XML
137
unknown
9
Portable Executable
6
ELF
5
DEX
1
File identification
MD5 0b4ac0f1a1ba80e3e13e697b9fe54ab1
SHA1 3ab405e0b81d0afad0353304b7370c8c9ec648ad
SHA256 0e714fce55aae3b9c60cc3862c2709707f4c8c01588a667ec643045e4ce305f3
ssdeep
393216:dxIk2lhjQOjLnz+j5ceyt4Av1o5jHYvDxgu0rOIYNSCWNad4tc0LLx2:dxSpJbzm6tP1ol9aVIFsd0cUx2

File size 15.4 MB ( 16145506 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-05-04 08:43:44 UTC ( 1 year, 9 months ago )
Last submission 2018-11-21 14:24:08 UTC ( 3 months ago )
File names 828747_46e1b6_com.igg.android.lordsmobile-94.apk
base.apk
lords-mobile.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.igg.android.lordsmobile-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.igg.android.lordsmobile