× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 18ce1e090b2d17f92c9bdca0f5a9b8322169998b0d201fc8eef3a323b75d7184
File name: Battlelands-Royale-v0.2.4-PdaLife.ru.apk
Detection ratio: 0 / 58
Analysis date: 2018-04-04 00:20:43 UTC ( 10 months, 3 weeks ago )
Antivirus Result Update
Ad-Aware 20180403
AegisLab 20180403
AhnLab-V3 20180403
Alibaba 20180403
ALYac 20180403
Antiy-AVL 20180403
Arcabit 20180403
Avast 20180404
Avast-Mobile 20180403
AVG 20180404
Avira (no cloud) 20180404
AVware 20180404
Baidu 20180403
BitDefender 20180404
Bkav 20180403
CAT-QuickHeal 20180403
ClamAV 20180403
CMC 20180403
Comodo 20180404
CrowdStrike Falcon (ML) 20170201
Cybereason 20180225
Cylance 20180404
Cyren 20180403
DrWeb 20180403
eGambit 20180404
Emsisoft 20180403
Endgame 20180403
ESET-NOD32 20180403
F-Prot 20180404
F-Secure 20180404
Fortinet 20180403
GData 20180403
Sophos ML 20180121
Jiangmin 20180403
K7AntiVirus 20180403
K7GW 20180403
Kingsoft 20180404
MAX 20180404
McAfee 20180404
McAfee-GW-Edition 20180404
Microsoft 20180403
eScan 20180403
NANO-Antivirus 20180403
nProtect 20180403
Palo Alto Networks (Known Signatures) 20180404
Panda 20180403
Qihoo-360 20180404
Rising 20180404
SentinelOne (Static ML) 20180225
Sophos AV 20180404
SUPERAntiSpyware 20180403
Symantec 20180403
Symantec Mobile Insight 20180401
Tencent 20180404
TheHacker 20180330
TotalDefense 20180403
TrendMicro-HouseCall 20180404
Trustlook 20180404
VBA32 20180403
VIPRE 20180403
ViRobot 20180403
WhiteArmor 20180403
Yandex 20180403
Zillya 20180403
ZoneAlarm by Check Point 20180403
Zoner 20180403
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.futureplay.battleground. The internal version number of the application is 43. The displayed version string of the application is 0.2.4. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.futureplay.battleground.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.unity.purchasing.googleplay.VRPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
net.agasper.unitynotification.UnityNotificationManager
net.agasper.unitynotification.UnityNotificationActionHandler
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.unity.purchasing.googleplay.VRPurchaseActivity
actions: com.google.vr.vrcore.ACTION_NONE
categories: com.google.intent.category.DAYDREAM
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.futureplay.battleground
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
522
Uncompressed size
227668197
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
xml
57
png
54
so
12
dat
3
map
1
MF
1
RSA
1
dex
1
ini
1
SF
1
mp3
1
Contained files by type
unknown
397
XML
57
PNG
54
ELF
12
DEX
1
MP3
1
File identification
MD5 0f9d2d622cafdc318a7ff4d408430e36
SHA1 98e8a4a3ceeaaf5a7d754780edb2133b013d93c9
SHA256 18ce1e090b2d17f92c9bdca0f5a9b8322169998b0d201fc8eef3a323b75d7184
ssdeep
1572864:pj4P1PFVFirCOZY6R9o1ODknrbafjUWjbnLKlNM/WISu3Xq5wemKoPSyr:pjONVFirCFn1OkEjljzCm/WISu3Xq+eS

File size 59.9 MB ( 62799151 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-04-01 07:45:08 UTC ( 10 months, 3 weeks ago )
Last submission 2018-04-02 07:12:41 UTC ( 10 months, 3 weeks ago )
File names Battlelands-Royale-v0.2.4-PdaLife.ru.apk
battlelands-royale-0.2.4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!