× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 19f9e513fc2f4f6c87611a8d3e5e3e276a8b503f79678f9a441d324df779e5ed
File name: 19f9e513fc2f4f6c87611a8d3e5e3e276a8b503f79678f9a441d324df779e5ed
Detection ratio: 2 / 57
Analysis date: 2017-02-02 13:38:14 UTC ( 2 years ago )
Antivirus Result Update
AVG Android/G2P.CJ.2A4020D56C88 20170202
WhiteArmor Android-PUA.SN-Sure.36373246233837576144080650.[PUA] 20170202
Ad-Aware 20170202
AegisLab 20170202
AhnLab-V3 20170202
Alibaba 20170122
ALYac 20170202
Antiy-AVL 20170202
Arcabit 20170202
Avast 20170202
Avira (no cloud) 20170202
AVware 20170202
Baidu 20170125
BitDefender 20170202
Bkav 20170123
CAT-QuickHeal 20170202
ClamAV 20170202
CMC 20170202
Comodo 20170202
CrowdStrike Falcon (ML) 20170130
Cyren 20170202
DrWeb 20170202
Emsisoft 20170202
ESET-NOD32 20170202
F-Prot 20170202
F-Secure 20170202
Fortinet 20170202
GData 20170202
Ikarus 20170202
Sophos ML 20170111
Jiangmin 20170202
K7AntiVirus 20170202
K7GW 20170202
Kaspersky 20170202
Kingsoft 20170202
Malwarebytes 20170202
McAfee 20170202
McAfee-GW-Edition 20170201
Microsoft 20170202
eScan 20170202
NANO-Antivirus 20170202
nProtect 20170202
Panda 20170201
Qihoo-360 20170202
Rising 20170202
Sophos AV 20170202
SUPERAntiSpyware 20170202
Symantec 20170201
Tencent 20170202
TheHacker 20170129
TotalDefense 20170202
TrendMicro-HouseCall 20170202
Trustlook 20170202
VBA32 20170202
VIPRE 20170202
ViRobot 20170202
Yandex 20170201
Zillya 20170201
Zoner 20170202
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.multientertainment.universejump. The internal version number of the application is 19. The displayed version string of the application is 1.0.19. The minimum Android API level for the application to run (MinSDKVersion) is 19. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.facebook.ads.InterstitialAdActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityAppLinkActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.facebook.unity.FBUnityGameRequestActivity
com.facebook.unity.FBUnityCreateGameGroupActivity
com.facebook.unity.FBUnityJoinGameGroupActivity
com.facebook.unity.AppInviteDialogActivity
com.facebook.FacebookActivity
com.chartboost.sdk.CBImpressionActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.heyzap.sdk.ads.MediationTestActivity
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Receivers
com.amazon.device.iap.ResponseReceiver
com.heyzap.sdk.ads.PackageAddedReceiver
Providers
com.facebook.FacebookContentProvider
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
644
Uncompressed size
231290252
Highest datetime
2016-08-31 11:14:14
Lowest datetime
2016-08-24 11:02:26
Contained files by extension
png
301
xml
57
dll
27
so
6
dex
1
MF
1
mdb
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
301
unknown
251
XML
57
Portable Executable
27
ELF
6
DEX
1
ZIP
1
File identification
MD5 ecf80db2481c81fe39f22aa1e931aba5
SHA1 55e0f0924f332343075a8428fe85fd86b6a15713
SHA256 19f9e513fc2f4f6c87611a8d3e5e3e276a8b503f79678f9a441d324df779e5ed
ssdeep
1572864:jU1PsKmhlpX+jBzLGM+XlJRXV+CoOy3RvlO3KbQA:jU1PsKKlpX+jlSM+dXECoOy3RdO3yJ

File size 51.7 MB ( 54163813 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android contains-pe contains-elf

VirusTotal metadata
First submission 2017-02-02 13:38:14 UTC ( 2 years ago )
Last submission 2017-02-02 13:38:14 UTC ( 2 years ago )
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!