× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 110f68b71b632ec60980e56963112c7318d5d374db7071b440bb8c78afa6c1de
File name: 869533_888376_sts.al-234294.apk
Detection ratio: 0 / 61
Analysis date: 2018-12-07 11:34:04 UTC ( 3 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20181207
AegisLab 20181207
AhnLab-V3 20181207
Alibaba 20180921
ALYac 20181207
Antiy-AVL 20181207
Arcabit 20181207
Avast 20181207
Avast-Mobile 20181207
AVG 20181207
Avira (no cloud) 20181207
Babable 20180918
Baidu 20181207
BitDefender 20181207
Bkav 20181206
CAT-QuickHeal 20181206
ClamAV 20181207
CMC 20181206
Comodo 20181207
CrowdStrike Falcon (ML) 20181022
Cybereason 20180308
Cylance 20181207
Cyren 20181207
DrWeb 20181207
eGambit 20181207
Emsisoft 20181207
Endgame 20181108
ESET-NOD32 20181207
F-Prot 20181207
F-Secure 20181207
Fortinet 20181207
GData 20181207
Ikarus 20181206
Sophos ML 20181128
Jiangmin 20181206
K7AntiVirus 20181207
K7GW 20181207
Kaspersky 20181207
Kingsoft 20181207
Malwarebytes 20181207
MAX 20181207
McAfee 20181207
McAfee-GW-Edition 20181207
Microsoft 20181207
eScan 20181207
NANO-Antivirus 20181207
Palo Alto Networks (Known Signatures) 20181207
Panda 20181206
Qihoo-360 20181207
Rising 20181207
SentinelOne (Static ML) 20181011
Sophos AV 20181207
SUPERAntiSpyware 20181205
Symantec 20181207
Symantec Mobile Insight 20181204
TACHYON 20181207
Tencent 20181207
TheHacker 20181202
TotalDefense 20181207
Trapmine 20181205
TrendMicro 20181207
TrendMicro-HouseCall 20181207
Trustlook 20181207
VBA32 20181206
VIPRE 20181207
ViRobot 20181207
Webroot 20181207
Yandex 20181204
Zillya 20181206
ZoneAlarm by Check Point 20181207
Zoner 20181207
The file being studied is Android related! APK Android file more specifically. The application's main package name is sts.al. The internal version number of the application is 234294. The displayed version string of the application is 1.6.2. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
sts.al.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
sts.al.ArcaneLegends
com.facebook.LoginActivity
com.fyber.ads.interstitials.InterstitialActivity
com.fyber.ads.ofw.OfferWallActivity
com.fyber.ads.videos.RewardedVideoActivity
com.fyber.cache.CacheVideoDownloadService
com.nativex.monetization.activities.InterstitialActivity
com.nativex.videoplayer.VideoActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
sts.game.GoogleAuthWebViewActivity
com.trialpay.android.views.webcontainer.WebContainerActivity
com.trialpay.android.views.webcontainer.WebContainerPopupActivity
com.trialpay.android.views.videocontainer.VideoContainerActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.tapjoy.TJContentActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
sts.al.ArcaneLegends$PushNotificationListenerService
sts.al.ArcaneLegends$PushNotificationTokenRefreshService
sts.al.ArcaneLegends$PushNotificationRegistrationService
sts.game.androidmarket.AndroidMarketBillingService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.fyber.cache.CacheVideoDownloadService
Receivers
com.google.android.gms.gcm.GcmReceiver
sts.al.ArcaneLegends$NotificationReceiver
sts.al.ArcaneLegends$BootReceiver
sts.al.ArcaneLegends$InstallReferrerReceiver
com.amazon.device.iap.ResponseReceiver
Service-related intent filters
sts.al.ArcaneLegends$PushNotificationListenerService
actions: com.google.android.c2dm.intent.RECEIVE
sts.al.ArcaneLegends$PushNotificationTokenRefreshService
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
sts.al.ArcaneLegends
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
sts.al.ArcaneLegends$InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: sts.al
sts.al.ArcaneLegends$NotificationReceiver
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
sts.al.ArcaneLegends$BootReceiver
actions: android.intent.action.EXTERNAL_APPLICATIONS_AVAILABLE, android.intent.action.USER_PRESENT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
669
Uncompressed size
114639391
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
477
xml
181
so
2
dex
1
MF
1
cfg
1
RSA
1
js
1
SF
1
Contained files by type
PNG
476
XML
180
unknown
10
ELF
2
DEX
1
File identification
MD5 959f40e375f207c0488f7938b23e71e9
SHA1 1bd17956344fdcea7c8e990579e5a4ddf59beb42
SHA256 110f68b71b632ec60980e56963112c7318d5d374db7071b440bb8c78afa6c1de
ssdeep
1572864:d39zU6wsQItxadryv65fbd3jWUz9egpvtfzj/tWrRO8U4tblH/FGCYkU1T0II14M:t9zU6wZITadrVhCUooj/tWr4elfJMw/X

File size 92.9 MB ( 97383151 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android via-tor contains-elf

VirusTotal metadata
First submission 2017-08-19 16:01:15 UTC ( 1 year, 7 months ago )
Last submission 2018-12-13 15:54:03 UTC ( 3 months, 1 week ago )
File names arcane-legends.apk
arcane-legends-1.6.2.apk
arcane-legends-mmo-action-rpg-1-6-2.apk
869533_888376_sts.al-234294.apk
sts.al.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!