× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 0fc09fc96c98c41b9d76dc2d052d0fac2637e1edb407cf57a1757829da7cb419
File name: [androidapplications.ru]com.dmg.hardway.apk
Detection ratio: 1 / 62
Analysis date: 2018-02-12 22:40:35 UTC ( 1 year, 3 months ago )
Antivirus Result Update
WhiteArmor PUP.HighConfidence 20180205
Ad-Aware 20180212
AegisLab 20180212
AhnLab-V3 20180212
Alibaba 20180209
ALYac 20180212
Antiy-AVL 20180212
Arcabit 20180212
Avast 20180212
Avast-Mobile 20180212
AVG 20180212
Avira (no cloud) 20180212
AVware 20180210
Baidu 20180208
BitDefender 20180212
Bkav 20180212
CAT-QuickHeal 20180212
ClamAV 20180212
CMC 20180212
Comodo 20180212
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180212
Cyren 20180212
DrWeb 20180212
eGambit 20180212
Emsisoft 20180212
Endgame 20171130
ESET-NOD32 20180212
F-Prot 20180212
F-Secure 20180212
Fortinet 20180212
GData 20180212
Ikarus 20180212
Sophos ML 20180121
Jiangmin 20180212
K7AntiVirus 20180212
K7GW 20180212
Kaspersky 20180212
Kingsoft 20180212
Malwarebytes 20180212
MAX 20180212
McAfee 20180212
McAfee-GW-Edition 20180212
Microsoft 20180212
eScan 20180212
NANO-Antivirus 20180212
nProtect 20180212
Palo Alto Networks (Known Signatures) 20180212
Panda 20180212
Qihoo-360 20180212
Rising 20180212
SentinelOne (Static ML) 20180115
Sophos AV 20180212
SUPERAntiSpyware 20180212
Symantec 20180212
Symantec Mobile Insight 20180212
Tencent 20180212
TheHacker 20180208
TrendMicro 20180212
TrendMicro-HouseCall 20180212
Trustlook 20180212
VBA32 20180212
VIPRE 20180212
ViRobot 20180212
Webroot 20180212
Yandex 20180210
Zillya 20180212
ZoneAlarm by Check Point 20180212
Zoner 20180212
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.dmg.hardway. The internal version number of the application is 9. The displayed version string of the application is 0.0.53. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.unity3d.player.VideoPlayer
com.unity3d.player.UnityPlayerActivity
com.androidnative.AndroidNativeProxy
com.androidnative.features.social.common.SocialProxyActivity
com.chartboost.sdk.CBImpressionActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.google.games.bridge.NativeBridgeActivity
com.voxelbusters.nativeplugins.features.gameservices.serviceprovider.google.GooglePlayGameUIActivity
com.voxelbusters.nativeplugins.features.ui.UiActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.twitter.sdk.android.core.identity.OAuthActivity
com.twitter.sdk.android.core.identity.ShareEmailActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
Providers
com.voxelbusters.nativeplugins.extensions.FileProviderExtended
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
364
Uncompressed size
203459346
Highest datetime
2017-03-15 22:49:06
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
97
xml
43
dll
21
so
4
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
198
PNG
97
XML
43
Portable Executable
21
ELF
4
DEX
1
File identification
MD5 86de9bfd294721c78576fac434342fa7
SHA1 2faf29e34f515ab63c17cf7c2751248ea1164781
SHA256 0fc09fc96c98c41b9d76dc2d052d0fac2637e1edb407cf57a1757829da7cb419
ssdeep
393216:1wV2Lic0PB65GGxYEP+cTnbAScY67HyNghZi5Yj+uin/wb9U7fCmxyNc9ZPW9d6p:1wV1XJ653GEPxEScY6S2i5X/wb9UWtWZ

File size 23.4 MB ( 24577598 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-pe contains-elf

VirusTotal metadata
First submission 2018-02-12 22:40:35 UTC ( 1 year, 3 months ago )
Last submission 2018-02-12 22:40:35 UTC ( 1 year, 3 months ago )
File names [androidapplications.ru]com.dmg.hardway.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!