× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1b319f8d50032c4a13d5765a070c6c09075832cbe20d51125d18c6e1054be455
File name: com.ayamob.video.apk
Detection ratio: 0 / 61
Analysis date: 2018-05-12 03:14:02 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180512
AegisLab 20180512
AhnLab-V3 20180511
Alibaba 20180511
ALYac 20180512
Antiy-AVL 20180512
Arcabit 20180512
Avast 20180512
Avast-Mobile 20180511
AVG 20180512
Avira (no cloud) 20180512
AVware 20180428
Babable 20180406
Baidu 20180511
BitDefender 20180512
Bkav 20180511
CAT-QuickHeal 20180511
ClamAV 20180511
CMC 20180511
Comodo 20180512
CrowdStrike Falcon (ML) 20180418
Cybereason None
Cylance 20180512
Cyren 20180512
eGambit 20180512
Emsisoft 20180512
Endgame 20180507
ESET-NOD32 20180512
F-Prot 20180512
F-Secure 20180511
Fortinet 20180512
GData 20180512
Ikarus 20180511
Sophos ML 20180503
Jiangmin 20180512
K7AntiVirus 20180511
K7GW 20180512
Kaspersky 20180512
Kingsoft 20180512
MAX 20180512
McAfee 20180512
McAfee-GW-Edition 20180511
Microsoft 20180511
eScan 20180512
NANO-Antivirus 20180512
nProtect 20180512
Palo Alto Networks (Known Signatures) 20180512
Panda 20180511
Qihoo-360 20180512
Rising 20180512
SentinelOne (Static ML) 20180225
Sophos AV 20180511
SUPERAntiSpyware 20180511
Symantec 20180511
Symantec Mobile Insight 20180511
Tencent 20180512
TheHacker 20180509
TotalDefense 20180511
TrendMicro 20180512
TrendMicro-HouseCall 20180512
Trustlook 20180512
VBA32 20180511
VIPRE 20180512
ViRobot 20180511
Webroot 20180512
Yandex 20180511
Zillya 20180511
ZoneAlarm by Check Point 20180512
Zoner 20180511
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.ayamob.video. The internal version number of the application is 11. The displayed version string of the application is 1.3.7. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.READ_SYNC_SETTINGS (read sync settings)
android.permission.MOUNT_UNMOUNT_FILESYSTEMS (mount and unmount file systems)
com.android.launcher.permission.UNINSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher2.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.INTERNET (full Internet access)
android.permission.EXPAND_STATUS_BAR (expand/collapse status bar)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
com.ayamob.video.permission.JPUSH_MESSAGE (Unknown permission from android reference)
android.permission.RECEIVE_USER_PRESENT (Unknown permission from android reference)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher3.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permissioms.WRITE_DATABASE (Unknown permission from android reference)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.android.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_FIND_LOCATION (Unknown permission from android reference)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.android.launcher.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.android.launcher3.permission.WRITE_SETTINGS (modify global system settings)
com.android.launcher2.permission.WRITE_SETTINGS (modify global system settings)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.READ_CONTACTS (read contact data)
android.permissions.READ_DATABASE (Unknown permission from android reference)
Activities
com.ayamob.video.MyActivity.StartActivity
com.ayamob.video.BaseActivity.MainActivity
com.ayamob.video.MyActivity.DownloadListActivity
com.ayamob.video.MyActivity.LocalVideoActivity
com.ayamob.video.MyActivity.LocalMediaActivity
com.ayamob.video.MyActivity.PlayVideoActivity
com.ayamob.video.MyActivity.DownloadActivity
com.ayamob.video.MyActivity.Download_To_Tips_Activity
com.ayamob.video.MyActivity.AboutActivity
com.ayamob.video.MyActivity.SettingActivity
com.ayamob.video.MyActivity.LocalMusicActivity
com.ayamob.video.MyActivity.VideoViewActivity
com.ayamob.video.jpush.JpushMainActivity
com.ayamob.video.MyActivity.ChapingActivity
com.facebook.ads.InterstitialAdActivity
com.dianxinos.lockscreen.LockScreenContainer
cn.jpush.android.ui.PopWinActivity
cn.jpush.android.ui.PushActivity
com.ayamob.video.MyActivity.webActivity
com.ayamob.video.MyActivity.YouTubeActivity
com.ayamob.video.MyActivity.GreatAppsChapingActivity
com.ayamob.video.MyActivity.InstagramActivity
com.ayamob.video.MyActivity.InstagramDownloadActivity
com.ayamob.video.MyActivity.VimeoActivity
com.ayamob.video.MyActivity.VimeoDownloadActivity
com.ayamob.video.MyActivity.FaceBookActivity
com.ayamob.video.MyActivity.FacebookDownloadActivity
com.ayamob.video.MyActivity.TwitterActivity
com.ayamob.video.MyActivity.TwitterDownloadActivity
com.ayamob.video.MyActivity.PlayAudioActivity
Services
cn.jpush.android.service.DaemonService
cn.jpush.android.service.DownloadService
cn.jpush.android.service.PushService
com.ayamob.video.Service.InstagramService
Receivers
com.duapps.ad.base.PackageAddReceiver
com.dianxinos.lockscreen.ad.LockPresentReceiver
com.ayamob.video.Receiver.MyStatusReceiver
cn.jpush.android.service.PushReceiver
cn.jpush.android.service.AlarmReceiver
com.ayamob.video.jpush.MyReceiver
Providers
com.duapps.ad.stats.DuAdCacheProvider
Service-related intent filters
cn.jpush.android.service.PushService
actions: cn.jpush.android.intent.REGISTER, cn.jpush.android.intent.REPORT, cn.jpush.android.intent.PushService, cn.jpush.android.intent.PUSH_TIME
cn.jpush.android.service.DaemonService
actions: cn.jpush.android.intent.DaemonService
categories: com.ayamob.video
Activity-related intent filters
com.ayamob.video.MyActivity.PlayVideoActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
com.ayamob.video.MyActivity.PlayAudioActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
cn.jpush.android.ui.PushActivity
actions: cn.jpush.android.ui.PushActivity
categories: android.intent.category.DEFAULT, com.ayamob.video
com.ayamob.video.MyActivity.StartActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.ayamob.video.MyActivity.DownloadActivity
actions: android.intent.action.SEND
categories: android.intent.category.DEFAULT
Receiver-related intent filters
cn.jpush.android.service.PushReceiver
actions: cn.jpush.android.intent.NOTIFICATION_RECEIVED_PROXY, android.intent.action.USER_PRESENT, android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED
categories: com.ayamob.video
com.dianxinos.lockscreen.ad.LockPresentReceiver
actions: android.intent.action.USER_PRESENT
com.ayamob.video.Receiver.MyStatusReceiver
actions: com.yao.downloaded
com.ayamob.video.jpush.MyReceiver
actions: cn.jpush.android.intent.REGISTRATION, cn.jpush.android.intent.UNREGISTRATION, cn.jpush.android.intent.MESSAGE_RECEIVED, cn.jpush.android.intent.NOTIFICATION_RECEIVED, cn.jpush.android.intent.NOTIFICATION_OPENED, cn.jpush.android.intent.ACTION_RICHPUSH_CALLBACK
categories: com.ayamob.video
com.duapps.ad.base.PackageAddReceiver
actions: android.intent.action.PACKAGE_ADDED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
596
Uncompressed size
7327722
Highest datetime
2016-07-05 13:32:54
Lowest datetime
2016-07-05 13:31:40
Contained files by extension
png
322
xml
252
so
3
ttf
3
dex
2
txt
2
MF
1
ap_
1
RSA
1
js
1
apk
1
SF
1
Contained files by type
PNG
322
XML
252
unknown
15
ELF
3
DEX
2
ZIP
2
File identification
MD5 28fc2f3f0af9a01d586e068425ca4f19
SHA1 0008046b4a5aa2faffdfd200ee686c1ee080a087
SHA256 1b319f8d50032c4a13d5765a070c6c09075832cbe20d51125d18c6e1054be455
ssdeep
98304:dRGHfBnlknmy0b3c8v4+8yKKKBO3xH/gWOS:d21lphM8v41BB8nn

File size 3.4 MB ( 3590131 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android dyn-calls contains-elf

VirusTotal metadata
First submission 2016-07-09 14:00:14 UTC ( 2 years, 3 months ago )
Last submission 2018-05-25 12:32:02 UTC ( 4 months, 4 weeks ago )
File names 28fc2f3f0af9a01d586e068425ca4f19
com.ayamob.video.apk
43.com.ayamob.video.apk
1732-com.ayamob.video.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.READ_PHONE_STATE:com.ayamob.video
android.permission.INTERNET:com.ayamob.video
android.permission.WAKE_LOCK:com.ayamob.video
android.permission.ACCESS_NETWORK_STATE:com.ayamob.video
com.ayamob.video.permission.JPUSH_MESSAGE:com.ayamob.video
android.permission.WRITE_EXTERNAL_STORAGE:com.ayamob.video
android.permission.WRITE_SETTINGS:com.ayamob.video
android.permission.VIBRATE:com.ayamob.video
android.permission.CHANGE_WIFI_STATE:com.ayamob.video
android.permission.ACCESS_FINE_LOCATION:com.ayamob.video
android.permission.ACCESS_COARSE_LOCATION:com.ayamob.video
android.permission.ACCESS_LOCATION_EXTRA_COMMANDS:com.ayamob.video
android.permission.ACCESS_WIFI_STATE:com.ayamob.video
Started services
#Intent;action=cn.jpush.android.intent.INIT;component=com.ayamob.video/cn.jpush.android.service.PushService;S.app=com.ayamob.video;end
#Intent;action=cn.jpush.android.intent.ALIAS_TAGS;component=com.ayamob.video/cn.jpush.android.service.PushService;S.tags=1_3_7%2Cen;l.seq_id=25457;end
Started receivers
android.intent.action.BATTERY_CHANGED
android.intent.action.SCREEN_ON
android.intent.action.SCREEN_OFF
cn.jpush.android.intent.TAG_ALIAS_TIMEOUT
cn.jpush.android.intent.TAG_ALIAS_CALLBACK
download_youtube
successful_yaohao
Opened files
/data/data/com.ayamob.video/files/.um
/mnt/sdcard/data
/data/data/com.ayamob.video/databases/cc/cc.db
/data/data/com.ayamob.video/files
/data/data/com.ayamob.video/databases/download3.db
/data/data/com.ayamob.video/databases/cc
/mnt/sdcard/com.ayamob.video
/mnt/sdcard
Accessed files
/data/data/com.ayamob.video/files
/data/data/com.ayamob.video/files/.um
/data/data/com.ayamob.video/files/.imprint
/data/data/com.ayamob.video/databases/cc
/data/data/com.ayamob.video/files/mobclick_agent_cached_com.ayamob.video11
/data/data/com.ayamob.video/files/umeng_it.cache
/mnt/sdcard/com.ayamob.video
/mnt/sdcard/data/.push_deviceid
/mnt/sdcard/data
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically called methods
android.os.SystemProperties.get 2 arguments.
u'gsm.version.baseband'
u'baseband'
Contacted URLs
http://api.mobula.sdk.duapps.com/adunion/slot/getSrcPrio/h=800&w=480&model=Nexus+S&vendor=samsung&sdk=15&dpi=240&sv=1.0.5.2&svn=HW-1.0.5.2&pkg=com.ayamob.video&v=11&vn=1.3.7&op=310260&locale=en_US&ntt=UMTS&ls=43a0f6a74184593571ab6f92e2089b8f&aid=bfc1484e2df11cc2&sid=11117&res=1080*460,244*244,170*170,108*108
http://common.duapps.com/appLock/getConf?model=Nexus+S&op=310260&vendor=samsung&locale=en_US&pkg=com.ayamob.video&tk=bfc1484e2df11cc2&h=800&vn=lockscreen_pub&w=480&v=1&ntt=UMTS&lc=pub&sdk=15&dpi=240&module=lockscreen
http://app.loveitsomuch.com/gonglue_xilie/ping.php?id=com.ayamob.video&version=1.3.7&is_android=1
Accessed URIs
content://com.ayamob.video.DuAdCacheProvider/parse
content://com.ayamob.video.DuAdCacheProvider/click
content://com.ayamob.video.DuAdCacheProvider/cache
content://com.ayamob.video.DuAdCacheProvider/record
content://com.ayamob.video.DuAdCacheProvider/preparse
content://com.ayamob.video.DuAdCacheProvider
content://com.facebook.katana.provider.AttributionIdProvider