× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 13d25307671808f47149f4c0e851ad9436311dcc1d1e26565adebfdd962a0df8
File name: 13d25307671808f47149f4c0e851ad9436311dcc1d1e26565adebfdd962a0df8
Detection ratio: 0 / 55
Analysis date: 2016-02-21 13:56:23 UTC ( 2 years, 12 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160221
AegisLab 20160221
Yandex 20160220
AhnLab-V3 20160221
Alibaba 20160221
Antiy-AVL 20160221
Arcabit 20160221
Avast 20160221
AVG 20160221
Avira (no cloud) 20160221
AVware 20160221
Baidu-International 20160221
BitDefender 20160221
Bkav 20160220
ByteHero 20160221
CAT-QuickHeal 20160220
ClamAV 20160221
CMC 20160219
Comodo 20160221
Cyren 20160221
DrWeb 20160221
Emsisoft 20160221
ESET-NOD32 20160221
F-Prot 20160221
F-Secure 20160219
Fortinet 20160220
GData 20160221
Ikarus 20160221
Jiangmin 20160221
K7AntiVirus 20160221
K7GW 20160221
Kaspersky 20160221
Malwarebytes 20160221
McAfee 20160221
McAfee-GW-Edition 20160220
Microsoft 20160221
eScan 20160221
NANO-Antivirus 20160221
nProtect 20160219
Panda 20160221
Qihoo-360 20160221
Rising 20160221
Sophos AV 20160221
SUPERAntiSpyware 20160221
Symantec 20160219
Tencent 20160221
TheHacker 20160217
TotalDefense 20160221
TrendMicro 20160221
TrendMicro-HouseCall 20160221
VBA32 20160220
VIPRE 20160221
ViRobot 20160221
Zillya 20160219
Zoner 20160221
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.dmall.mfandroid. The internal version number of the application is 32. The displayed version string of the application is 3.1.2. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
com.dmall.mfandroid.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CAMERA (take pictures and videos)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.dmall.mfandroid.activity.base.Splash
com.dmall.mfandroid.activity.base.NHomeActivity
com.facebook.LoginActivity
scanpay.it.ScanPayActivity
scanpay.it.ValidationActivity
Services
com.netmera.mobile.NetmeraIntentService
com.dmall.mfandroid.receiver.TrackingIntentService
com.dmall.mfandroid.appwidget.StackWidgetService
Receivers
com.netmera.mobile.NetmeraBroadcastReceiver
com.dmall.mfandroid.appwidget.StackWidgetProvider
com.dmall.mfandroid.omniture.GPBroadcastReceiver
Activity-related intent filters
com.dmall.mfandroid.activity.base.NHomeActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.dmall.mfandroid.activity.base.Splash
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.netmera.mobile.NetmeraBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.dmall.mfandroid
com.dmall.mfandroid.appwidget.StackWidgetProvider
actions: android.appwidget.action.APPWIDGET_UPDATE
com.dmall.mfandroid.omniture.GPBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2284
Uncompressed size
3505204
Highest datetime
2015-05-07 17:23:44
Lowest datetime
2015-05-07 17:22:52
Contained files by extension
png
506
xml
481
ttf
4
otf
2
jpg
2
mp3
1
Contained files by type
PNG
506
XML
481
unknown
9
JPG
2
JSON
1
MP3
1
File identification
MD5 086cf4f62fe04a23740e8fd2fef36825
SHA1 56b4e5b20b2d661d3ab0807ee4419766fcd95c12
SHA256 13d25307671808f47149f4c0e851ad9436311dcc1d1e26565adebfdd962a0df8
ssdeep
393216:dGEBDZOj1lH2z0/r0wjX8Mhdcom0rZz+A:djB9OjH2z0/rLjORTA

File size 13.3 MB ( 13961348 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (62.1%)
Java Archive (17.1%)
BlueEyes Animation (15.9%)
ZIP compressed archive (4.7%)
Tags
apk android

VirusTotal metadata
First submission 2015-05-13 03:23:12 UTC ( 3 years, 9 months ago )
Last submission 2016-10-31 03:42:38 UTC ( 2 years, 3 months ago )
File names ecad10f9442dba0048a18afc762691eddebaac75709b88e41764370888c79813eff0714492593ade35caaa64a6bc56c0b54d581dd948b8f8ce97093d31d58449
13d25307671808f47149f4c0e851ad9436311dcc1d1e26565adebfdd962a0df8
n11-com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_FINE_LOCATION:com.dmall.mfandroid
android.permission.ACCESS_NETWORK_STATE:com.dmall.mfandroid
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/com.dmall.mfandroid/files/AdjustAttribution
/data/data/com.dmall.mfandroid/files/AdjustIoActivityState
/data/data/com.dmall.mfandroid/files/AdjustIoPackageQueue
/data/data/com.dmall.mfandroid/files
/data/data/com.dmall.mfandroid/files/MintSavedData-1-1349849029510.json
APP_ASSETS/ADBMobileConfig.json
/data/data/com.dmall.mfandroid/files/Mint-lastsavedfile
Accessed files
/data/data/com.dmall.mfandroid/files
/sbin/su
/system/bin/su
/system/xbin/su
/data/data/com.dmall.mfandroid/files/.setForceSendPingOnNextStart
/data/data/com.dmall.mfandroid/cacheADBMobileDataCache.sqlite
/data/data/com.dmall.mfandroid/files/MintSavedData-1-1349849029510.json
/data/data/com.dmall.mfandroid/files/Mint-lastsavedfile
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://dogusplanet.d3.sc.omtrdc.net/id
https://app.adjust.com/session
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
https://app.adjust.com/attribution/needs_attribution_data=0&app_token=cxn7bwcrphw2&android_id=2cd338739a4d4ff4&mac_sha1=2bd5ac73a1299461decd4503ed1eec89d2f27436&environment=production&android_uuid=4c4823f1-3bcd-44f9-be3e-99d8f6246353&mac_md5=d41cdcfce8d779780ce0f98f9c618612
https://c6b1a11f.api.splkmobile.com/1.0/c6b1a11f/0dabbf9dde018f975a7d26d30e0a0124/0/1/hash=none
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider