× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 15ebc77c2ed53b650e56be78587c154b7c5df6770252742d48207fc8f12c4554
File name: com.vg.crazydriverpolice.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-01 12:12:33 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160601
AegisLab 20160601
AhnLab-V3 20160601
Alibaba 20160601
ALYac 20160601
Antiy-AVL 20160601
Arcabit 20160601
Avast 20160601
AVG 20160601
Avira (no cloud) 20160601
AVware 20160601
Baidu 20160601
Baidu-International 20160601
BitDefender 20160601
Bkav 20160531
CAT-QuickHeal 20160601
ClamAV 20160601
CMC 20160530
Comodo 20160601
Cyren 20160601
DrWeb 20160601
Emsisoft 20160601
ESET-NOD32 20160601
F-Prot 20160601
F-Secure 20160601
Fortinet 20160601
GData 20160601
Ikarus 20160601
Jiangmin 20160601
K7AntiVirus 20160601
K7GW 20160601
Kaspersky 20160601
Kingsoft 20160601
Malwarebytes 20160601
McAfee 20160601
McAfee-GW-Edition 20160601
Microsoft 20160601
eScan 20160601
NANO-Antivirus 20160601
nProtect 20160601
Panda 20160531
Qihoo-360 20160601
Rising 20160601
Sophos AV 20160601
SUPERAntiSpyware 20160601
Symantec 20160601
Tencent 20160601
TheHacker 20160601
TotalDefense 20160601
TrendMicro 20160601
TrendMicro-HouseCall 20160601
VBA32 20160531
VIPRE 20160601
ViRobot 20160601
Yandex 20160531
Zillya 20160531
Zoner 20160601
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.vg.crazydriverpolice. The internal version number of the application is 5. The displayed version string of the application is 1.4. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_NETWORK_STATE (view network status)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
com.unity3d.player.VideoPlayer
com.google.android.gms.ads.AdActivity
com.inmobi.androidsdk.IMBrowserActivity
com.mdotm.android.view.MdotMActivity
com.outlinegames.unibill.PurchaseActivity
Receivers
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
468
Uncompressed size
198124792
Highest datetime
2014-11-13 22:05:02
Lowest datetime
2014-10-08 04:54:48
Contained files by extension
dll
23
png
17
xml
4
so
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
420
Portable Executable
23
PNG
17
XML
4
ELF
3
DEX
1
File identification
MD5 ed42b53faf6f099659f102ae38531264
SHA1 a37651c89b27453e5749e634daa5148f5d9154ef
SHA256 15ebc77c2ed53b650e56be78587c154b7c5df6770252742d48207fc8f12c4554
ssdeep
1572864:7P2eBCx4fA7OC+7Vq2+Rwqid2jARhR0HXodQOBFB:j2p7OCmU2H1d2jW4HYlX

File size 49.5 MB ( 51953197 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2014-11-15 02:52:05 UTC ( 4 years, 2 months ago )
Last submission 2016-06-18 21:37:46 UTC ( 2 years, 7 months ago )
File names crazy-driver-police-duty-3d.apk
crazy-driver-police-duty-3d.apk
com.vg.crazydriverpolice-1.apk
com.vg.crazydriverpolice.apk
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0104.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!