× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 128f455f8308e81b28fb88261934cc25a1d48806795faf7c6c2423b301d9b192
File name: 781.apk
Detection ratio: 0 / 63
Analysis date: 2018-08-04 00:07:48 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180803
AegisLab 20180803
AhnLab-V3 20180803
Alibaba 20180713
ALYac 20180804
Antiy-AVL 20180804
Arcabit 20180804
Avast 20180803
Avast-Mobile 20180803
AVG 20180803
Avira (no cloud) 20180803
AVware 20180727
Babable 20180725
Baidu 20180802
BitDefender 20180803
Bkav 20180803
CAT-QuickHeal 20180803
ClamAV 20180803
CMC 20180803
Comodo 20180804
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180804
Cyren 20180803
DrWeb 20180804
eGambit 20180804
Emsisoft 20180803
Endgame 20180730
ESET-NOD32 20180803
F-Prot 20180804
F-Secure 20180804
Fortinet 20180803
GData 20180804
Ikarus 20180803
Sophos ML 20180717
Jiangmin 20180803
K7AntiVirus 20180803
K7GW 20180803
Kaspersky 20180803
Kingsoft 20180804
Malwarebytes 20180804
MAX 20180804
McAfee 20180804
McAfee-GW-Edition 20180803
Microsoft 20180803
eScan 20180803
NANO-Antivirus 20180803
Palo Alto Networks (Known Signatures) 20180804
Panda 20180803
Qihoo-360 20180804
Rising 20180803
SentinelOne (Static ML) 20180701
Sophos AV 20180803
SUPERAntiSpyware 20180803
Symantec 20180803
Symantec Mobile Insight 20180801
TACHYON 20180803
Tencent 20180804
TheHacker 20180802
TotalDefense 20180803
TrendMicro 20180803
TrendMicro-HouseCall 20180803
Trustlook 20180804
VBA32 20180803
VIPRE 20180803
ViRobot 20180803
Webroot 20180804
Yandex 20180803
Zillya 20180803
ZoneAlarm by Check Point 20180803
Zoner 20180803
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.netease.ko. The internal version number of the application is 50. The displayed version string of the application is 1.211.415162. The minimum Android API level for the application to run (MinSDKVersion) is 17. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
com.qti.permission.PROFILER (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.FLASHLIGHT (control flashlight)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.CAMERA (take pictures and videos)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECORD_AUDIO (record audio)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
Activities
com.netease.game.MessiahNativeActivity
com.netease.messiah.VideoPlayer
com.soundcloud.android.crop.CropImageActivity
com.netease.ntunisdk.base.deeplink.UniDeepLinkActivity
com.netease.mpay.oversea.task.handlers.MpayActivity
com.netease.mpay.oversea.task.handlers.MpayUserCenterActivity
com.netease.mpay.oversea.task.handlers.MpayInterimActivity
com.google.android.gms.common.api.GoogleApiActivity
jp.line.android.sdk.activity.WebLoginActivity
jp.line.android.sdk.activity.LineAuthCompleteActivity
com.twitter.sdk.android.tweetui.PlayerActivity
com.twitter.sdk.android.tweetui.GalleryActivity
com.twitter.sdk.android.tweetcomposer.ComposerActivity
com.twitter.sdk.android.core.identity.OAuthActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.netease.ntunisdk.zxing.client.android.CaptureActivity
com.facebook.CustomTabActivity
com.facebook.CustomTabMainActivity
com.facebook.FacebookActivity
Services
com.twitter.sdk.android.tweetcomposer.TweetUploadService
com.google.android.gms.auth.api.signin.RevocationBoundService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
Providers
com.netease.unisdk.gmbridge.provider.GmFileProvider
com.netease.ntunisdk.UniCompatFileProvider
com.facebook.FacebookContentProvider
com.netease.ntunisdk.UniFacebookFileProvider
Activity-related intent filters
com.netease.ntunisdk.base.deeplink.UniDeepLinkActivity
actions: android.intent.action.VIEW
categories: android.intent.category.BROWSABLE, android.intent.category.DEFAULT
jp.line.android.sdk.activity.LineAuthCompleteActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.netease.game.MessiahNativeActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1095
Uncompressed size
72106502
Highest datetime
2018-07-24 17:13:44
Lowest datetime
1980-01-01 08:00:00
Contained files by extension
png
625
xml
216
so
17
jpg
15
bin
9
txt
3
dex
2
MF
1
RSA
1
ttf
1
lst
1
SF
1
Contained files by type
PNG
625
XML
215
unknown
119
ELF
17
JPG
15
JSON
6
DEX
2
HTML
1
File identification
MD5 00e60bb4a586f972091c851926a0646f
SHA1 432c07fc4f30cb88e5e0845d1d0da515bd9f0c50
SHA256 128f455f8308e81b28fb88261934cc25a1d48806795faf7c6c2423b301d9b192
ssdeep
786432:BVT1+i3HnRmUQ7qTH8GZA/tQ4t9E33s8V2iPa6IZ0Ku6NndC4:BLzh/Q7yZAFiHsvibm0Ku6NndC4

File size 32.3 MB ( 33880619 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-08-04 00:07:48 UTC ( 5 months, 2 weeks ago )
Last submission 2018-08-17 10:05:52 UTC ( 5 months ago )
File names 781.apk
knives-out-6x6km-battle-royale.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!