× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1471d1d1081f5896b42e21686e7ab73dc6cb84d2d055685a5c712e23b3307399
File name: 573073_bd9692_kill_shot_v2.8.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-10 05:17:29 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160610
AegisLab 20160610
AhnLab-V3 20160609
Alibaba 20160608
ALYac 20160610
Antiy-AVL 20160610
Arcabit 20160610
Avast 20160610
AVG 20160609
Avira (no cloud) 20160610
AVware 20160609
Baidu 20160608
Baidu-International 20160606
BitDefender 20160610
Bkav 20160610
CAT-QuickHeal 20160609
ClamAV 20160610
CMC 20160607
Comodo 20160609
Cyren 20160610
DrWeb 20160610
Emsisoft 20160610
ESET-NOD32 20160610
F-Prot 20160610
F-Secure 20160610
Fortinet 20160610
GData 20160610
Ikarus 20160609
Jiangmin 20160610
K7AntiVirus 20160609
K7GW 20160610
Kaspersky 20160610
Kingsoft 20160610
Malwarebytes 20160610
McAfee 20160610
McAfee-GW-Edition 20160610
Microsoft 20160609
eScan 20160610
NANO-Antivirus 20160610
nProtect 20160609
Panda 20160609
Qihoo-360 20160610
Rising 20160610
Sophos AV 20160610
SUPERAntiSpyware 20160610
Symantec 20160610
Tencent 20160610
TheHacker 20160610
TotalDefense 20160610
TrendMicro 20160610
TrendMicro-HouseCall 20160610
VBA32 20160609
VIPRE 20160610
ViRobot 20160610
Yandex 20160609
Zillya 20160609
Zoner 20160610
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.hotheadgames.google.free.rawsniper. The internal version number of the application is 28021401. The displayed version string of the application is 2.8. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
com.hotheadgames.google.free.rawsniper.permission.C2D_MESSAGE (C2DM permission.)
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECORD_AUDIO (record audio)
Activities
com.hotheadgames.android.horque.HorqueActivity
com.hotheadgames.android.horque.thirdparty.PickFriendsActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.sponsorpay.mediation.hyprmx.mbe.HyprMXVideoActivity
com.hyprmx.android.sdk.activity.HyprMXOfferViewerActivity
com.hyprmx.android.sdk.activity.HyprMXRequiredInformationActivity
com.hyprmx.android.sdk.activity.HyprMXSplashActivity
com.hyprmx.android.sdk.activity.HyprMXOfferListActivity
com.hyprmx.android.sdk.activity.HyprMXNoOffersActivity
com.hyprmx.android.sdk.activity.HyprMXWebTrafficActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.chartboost.sdk.CBImpressionActivity
com.facebook.FacebookActivity
com.facebook.ads.InterstitialAdActivity
com.vungle.publisher.FullScreenAdActivity
com.sponsorpay.publisher.mbe.SPBrandEngageActivity
com.sponsorpay.publisher.interstitial.SPInterstitialActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.kamcord.android.KamcordActivity
com.kamcord.android.ReplayActivity
com.kamcord.android.WebActivity
com.helpshift.HSConversation
com.helpshift.HSQuestionsList
com.helpshift.HSQuestion
com.helpshift.HSSection
com.helpshift.HSFaqs
com.helpshift.HSReview
com.helpshift.ScreenshotPreviewActivity
com.helpshift.SearchResultActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
Services
org.openudid.OpenUDID_service
com.hyprmx.android.sdk.service.ApplicationInstallService
com.vungle.publisher.VungleService
com.kamcord.android.UploadService
com.helpshift.HSService
com.helpshift.HSRetryService
com.hotheadgames.android.horque.thirdparty.AndroidSwrveGcmIntentService
Receivers
com.hotheadgames.android.horque.AlarmReceiver
com.hotheadgames.android.horque.HorqueReceiver
com.hotheadgames.android.horque.GcmReceiver
Service-related intent filters
org.openudid.OpenUDID_service
actions: org.openudid.GETUDID
Activity-related intent filters
com.hotheadgames.android.horque.HorqueActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.hotheadgames.android.horque.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.hotheadgames.google.free.rawsniper
com.hotheadgames.android.horque.HorqueReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
569
Uncompressed size
66965596
Highest datetime
2016-03-02 07:38:32
Lowest datetime
2016-03-02 07:22:40
Contained files by extension
png
427
xml
121
so
6
otf
3
mp3
2
dex
1
MF
1
RSA
1
js
1
txt
1
SF
1
Contained files by type
PNG
427
XML
121
unknown
14
ELF
6
DEX
1
File identification
MD5 a37bdc1ebdbdf9294cff1a99dfbfbc67
SHA1 2cdcd099d63425a419db0e68257127008e1350e5
SHA256 1471d1d1081f5896b42e21686e7ab73dc6cb84d2d055685a5c712e23b3307399
ssdeep
1572864:5x7+dvrBbrMdVdiUj82SnpMpoWMxz86zJPflDbw:5xydvr9AHwCo3bzplbw

File size 52.9 MB ( 55435330 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (48.3%)
Sweet Home 3D design (generic) (35.0%)
ZIP compressed archive (13.3%)
PrintFox/Pagefox bitmap (var. P) (3.3%)
Tags
apk checks-gps android contains-elf

VirusTotal metadata
First submission 2016-03-02 23:45:37 UTC ( 3 years ago )
Last submission 2019-01-25 05:33:00 UTC ( 1 month, 3 weeks ago )
File names kill-shot-2.8.apk
kill-shot.apk
base.apk
2268-a37bdc1ebdbdf9294cff1a99dfbfbc67-1458897618.apk
573073_bd9692_kill_shot_v2.8.apk
2268-a37bdc1ebdbdf9294cff1a99dfbfbc67-1458897618.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal.tmp
/data/data/com.hotheadgames.google.free.rawsniper/cache/volley
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http
/data/data/com.hotheadgames.google.free.rawsniper/files
/mnt/sdcard/Android/data/com.hotheadgames.google.free.rawsniper/files
/mnt/sdcard/Android/data/com.hotheadgames.google.free.rawsniper/cache
Accessed files
/data/data/com.hotheadgames.google.free.rawsniper/cache/volley
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal.bkp
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
https://api.kiip.me/2.0/app/cache