× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 153e9973445b710182c7faa015e1ec53df55ab515c3019824f50572e911e1509
File name: 1520288767-d91aa292a0afc96a19ea190bd1a0faf4.apk
Detection ratio: 0 / 52
Analysis date: 2018-03-05 22:27:08 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware 20180305
AhnLab-V3 20180305
Alibaba 20180305
ALYac 20180305
Arcabit 20180305
Avast 20180305
Avast-Mobile 20180305
AVG 20180305
Avira (no cloud) 20180305
AVware 20180305
CAT-QuickHeal 20180305
ClamAV 20180305
CMC 20180305
Comodo 20180305
CrowdStrike Falcon (ML) 20170201
Cybereason 20180225
Cylance 20180305
Cyren 20180305
DrWeb 20180305
eGambit 20180305
Emsisoft 20180305
Endgame 20180303
ESET-NOD32 20180305
F-Prot 20180305
F-Secure 20180305
Fortinet 20180305
GData 20180305
Ikarus 20180305
Sophos ML 20180121
K7AntiVirus 20180305
K7GW 20180305
Kingsoft 20180305
MAX 20180305
McAfee 20180305
McAfee-GW-Edition 20180305
Microsoft 20180305
nProtect 20180305
Palo Alto Networks (Known Signatures) 20180305
Panda 20180305
Qihoo-360 20180305
Rising 20180305
SentinelOne (Static ML) 20180225
Sophos AV 20180305
SUPERAntiSpyware 20180305
Symantec 20180305
Tencent 20180305
TotalDefense 20180305
TrendMicro 20180305
TrendMicro-HouseCall 20180305
Trustlook 20180305
VBA32 20180305
ViRobot 20180305
Webroot 20180305
WhiteArmor 20180223
Yandex 20180303
Zillya 20180305
ZoneAlarm by Check Point 20180305
Zoner 20180305
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.playmotionsg.irongiants. The internal version number of the application is 73. The displayed version string of the application is 1.1.73. The minimum Android API level for the application to run (MinSDKVersion) is 19. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
com.huawei.android.launcher.permission.WRITE_SETTINGS (modify global system settings)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
com.huawei.android.launcher.permission.CHANGE_BADGE (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.sec.android.provider.badge.permission.WRITE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
com.oppo.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
com.majeur.launcher.permission.UPDATE_BADGE (Unknown permission from android reference)
android.permission.android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.htc.launcher.permission.UPDATE_SHORTCUT (Unknown permission from android reference)
com.htc.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.anddoes.launcher.permission.UPDATE_COUNT (Unknown permission from android reference)
com.sonymobile.home.permission.PROVIDER_INSERT_BADGE (Unknown permission from android reference)
com.oppo.launcher.permission.WRITE_SETTINGS (modify global system settings)
android.permission.VIBRATE (control vibrator)
com.huawei.android.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.playmotionsg.irongiants.permission.C2D_MESSAGE (C2DM permission.)
com.sonyericsson.home.permission.BROADCAST_BADGE (Unknown permission from android reference)
com.sec.android.provider.badge.permission.READ (Unknown permission from android reference)
android.permission.READ_APP_BADGE (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.facebook.ads.InterstitialAdActivity
com.facebook.ads.AudienceNetworkActivity
com.chartboost.sdk.CBImpressionActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.unity.purchasing.googleplay.VRPurchaseActivity
com.heyzap.sdk.ads.MediationTestActivity
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.onesignal.PermissionsActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.onesignal.GcmIntentService
com.onesignal.SyncService
com.onesignal.NotificationRestoreService
com.google.android.gms.auth.api.signin.RevocationBoundService
Receivers
com.heyzap.sdk.ads.PackageAddedReceiver
com.onesignal.GcmBroadcastReceiver
com.onesignal.NotificationOpenedReceiver
com.onesignal.BootUpReceiver
com.onesignal.UpgradeReceiver
com.hippogames.simpleandroidnotifications.Controller
Activity-related intent filters
com.unity.purchasing.googleplay.VRPurchaseActivity
actions: com.google.vr.vrcore.ACTION_NONE
categories: com.google.intent.category.DAYDREAM
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
com.onesignal.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.playmotionsg.irongiants
com.onesignal.BootUpReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
com.onesignal.UpgradeReceiver
actions: android.intent.action.MY_PACKAGE_REPLACED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
304
Uncompressed size
150926608
Highest datetime
2017-07-31 15:14:58
Lowest datetime
1980-01-01 05:30:00
Contained files by extension
png
108
xml
25
dll
20
so
4
dex
1
MF
1
RSA
1
wav
1
txt
1
SF
1
Contained files by type
unknown
157
PNG
108
Portable Executable
20
XML
14
ELF
4
DEX
1
File identification
MD5 0f558707ad4e23111624f94a655e8935
SHA1 9958c6b49148c0c60bf4f0fd1ac75c52eea3449f
SHA256 153e9973445b710182c7faa015e1ec53df55ab515c3019824f50572e911e1509
ssdeep
1572864:DQfX0mQ5qhPFB0RH5io3rBh+MeakzRaUmCd3psTkTOLXMxgWJN4LcS:cfeE/0RFth/ebRaUmCdlO8PN4r

File size 60.7 MB ( 63698731 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-02-04 21:31:08 UTC ( 1 year, 3 months ago )
Last submission 2018-03-05 22:27:08 UTC ( 1 year, 2 months ago )
File names 1520288767-d91aa292a0afc96a19ea190bd1a0faf4.apk
1517779804-d91aa292a0afc96a19ea190bd1a0faf4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!