× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 17deb6b30a5833f5282189ea5f9ae58ca96e6bb4721f0e3a9ba4a3178cb5aafe
File name: 1420367406_com.degoo.android.lhelper.apk
Detection ratio: 2 / 55
Analysis date: 2016-06-24 06:52:13 UTC ( 1 year, 11 months ago ) View latest
Antivirus Result Update
Cyren AndroidOS/GenPua.761FCDDC!Olympus 20160624
ESET-NOD32 a variant of Android/Anydown.J potentially unsafe 20160624
Ad-Aware 20160624
AegisLab 20160624
AhnLab-V3 20160624
Alibaba 20160624
ALYac 20160624
Antiy-AVL 20160624
Arcabit 20160624
Avast 20160624
AVG 20160624
Avira (no cloud) 20160624
AVware 20160624
Baidu 20160624
Baidu-International 20160614
BitDefender 20160624
Bkav 20160623
CAT-QuickHeal 20160623
ClamAV 20160624
CMC 20160620
Comodo 20160624
DrWeb 20160624
Emsisoft 20160624
F-Prot 20160624
F-Secure 20160624
Fortinet 20160624
GData 20160624
Ikarus 20160624
Jiangmin 20160624
K7AntiVirus 20160624
K7GW 20160624
Kaspersky 20160624
Kingsoft 20160624
Malwarebytes 20160623
McAfee 20160624
McAfee-GW-Edition 20160624
Microsoft 20160624
eScan 20160624
NANO-Antivirus 20160624
nProtect 20160623
Panda 20160623
Qihoo-360 20160624
Sophos AV 20160623
SUPERAntiSpyware 20160624
Symantec 20160624
Tencent 20160624
TheHacker 20160624
TotalDefense 20160624
TrendMicro 20160624
TrendMicro-HouseCall 20160624
VBA32 20160623
VIPRE 20160624
ViRobot 20160624
Yandex 20160621
Zillya 20160623
Zoner 20160624
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.degoo.android.lhelper. The internal version number of the application is 2. The displayed version string of the application is 1.0.1. The minimum Android API level for the application to run (MinSDKVersion) is 9.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.ACCESS_COARSE (Unknown permission from android reference)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.FINE_LOCATION (Unknown permission from android reference)
com.google.android.gms.permission.ACTIVITY_RECOGNITION (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.MOUNT_UNMOUNT_FILESYSTEMS (mount and unmount file systems)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
com.cocos2d.diguo.template.SplashActivity
com.bgames.android.activity.MainGameActivity
com.google.android.gms.ads.AdActivity
com.ironsource.mobilcore.InterstitialVideoActivity
com.inmobi.androidsdk.IMBrowserActivity
com.chartboost.sdk.CBDialogActivity
com.flurry.android.CatalogActivity
com.facebook.LoginActivity
Services
com.ironsource.mobilcore.MobileCoreReport
com.cocos2d.diguo.template.LocalNotificationService
com.inmobi.commons.internal.ActivityRecognitionManager
Receivers
com.ironsource.mobilcore.InstallationTracker
com.cocos2d.diguo.template.SHNotification
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
Service-related intent filters
com.cocos2d.diguo.template.LocalNotificationService
actions: com.cocos2d.diguo.template.LocalNotificationService
categories: android.intent.category.default
Activity-related intent filters
com.bgames.android.activity.MainGameActivity
actions: com.bgames.android.activity.MainGameActivity
categories: android.intent.category.DEFAULT
com.flurry.android.CatalogActivity
actions: com.g6677.android.drinkstore.Flurry
categories: android.intent.category.DEFAULT
com.cocos2d.diguo.template.SplashActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
actions: com.android.vending.INSTALL_REFERRER, android.net.conn.CONNECTIVITY_CHANGE, com.inmobi.share.id
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1266
Uncompressed size
11253274
Highest datetime
2014-12-23 20:05:12
Lowest datetime
2014-12-23 19:42:54
Contained files by extension
png
965
jpg
25
mp3
2
wav
1
Contained files by type
PNG
965
JPG
25
XML
5
unknown
3
MP3
2
File identification
MD5 761fcddc774b03cab1af25bc71f9a176
SHA1 be15afd5939e140e131ff0cd83681a8f5d9fe7f0
SHA256 17deb6b30a5833f5282189ea5f9ae58ca96e6bb4721f0e3a9ba4a3178cb5aafe
ssdeep
393216:gy6TU/BJAtgl+ZA4wu2u/iKcu0hNm8ZCHAgcA/P5aD9:S4pJAc2p/2u8u0DyJceK

File size 16.9 MB ( 17713635 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (62.1%)
Java Archive (17.1%)
BlueEyes Animation (15.9%)
ZIP compressed archive (4.7%)
Tags
apk android

VirusTotal metadata
First submission 2015-01-04 07:48:35 UTC ( 3 years, 4 months ago )
Last submission 2016-06-24 06:52:13 UTC ( 1 year, 11 months ago )
File names com.degoo.android.lhelper.apk
1420367406_com.degoo.android.lhelper.apk
17deb6b30a5833f5282189ea5f9ae58ca96e6bb4721f0e3a9ba4a3178cb5aafe
com.degoo.android.lhelper_LastUpdated__December232014.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!