× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1bce228eba701f6b77f11c1be82cc8433537838b1eff4b09080838b9d6e2e449
File name: yhdg_1418106649974.apk
Detection ratio: 0 / 56
Analysis date: 2015-11-29 00:27:45 UTC ( 3 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20151129
AegisLab 20151128
Yandex 20151128
AhnLab-V3 20151128
Alibaba 20151127
ALYac 20151129
Antiy-AVL 20151129
Arcabit 20151129
Avast 20151129
AVG 20151129
Avira (no cloud) 20151128
AVware 20151128
Baidu-International 20151128
BitDefender 20151129
Bkav 20151128
ByteHero 20151129
CAT-QuickHeal 20151128
ClamAV 20151129
CMC 20151127
Comodo 20151128
Cyren 20151128
DrWeb 20151128
Emsisoft 20151128
ESET-NOD32 20151128
F-Prot 20151128
F-Secure 20151128
Fortinet 20151128
GData 20151128
Ikarus 20151128
Jiangmin 20151128
K7AntiVirus 20151128
K7GW 20151128
Kaspersky 20151128
Malwarebytes 20151128
McAfee 20151128
McAfee-GW-Edition 20151128
Microsoft 20151128
eScan 20151128
NANO-Antivirus 20151128
nProtect 20151127
Panda 20151128
Qihoo-360 20151129
Rising 20151128
Sophos AV 20151128
SUPERAntiSpyware 20151128
Symantec 20151128
Tencent 20151129
TheHacker 20151127
TotalDefense 20151128
TrendMicro 20151129
TrendMicro-HouseCall 20151129
VBA32 20151129
VIPRE 20151129
ViRobot 20151128
Zillya 20151127
Zoner 20151128
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tap4fun.ge. The internal version number of the application is 3467. The displayed version string of the application is 1.9.15. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 11.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.tap4fun.ge.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.tap4fun.spartanwar.GameActivity
com.tap4fun.spartanwar.google.gcm.GCMMessageActivity
com.facebook.LoginActivity
Services
com.tap4fun.spartanwar.utils.notification.LocalNotificationService
com.tap4fun.spartanwar.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
com.tap4fun.spartanwar.utils.system.MyInstallReceiver
com.AdX.tag.AdXAppTracker
Activity-related intent filters
com.tap4fun.spartanwar.GameActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.tap4fun.ge
com.tap4fun.spartanwar.utils.system.MyInstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.AdX.tag.AdXAppTracker
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
202
Uncompressed size
53536803
Highest datetime
2014-12-01 11:28:20
Lowest datetime
2014-01-28 09:53:24
Contained files by extension
png
149
xml
36
jpg
2
txt
2
dex
1
MF
1
zip
1
RSA
1
js
1
apk
1
so
1
SF
1
Contained files by type
PNG
149
XML
36
unknown
10
ZIP
2
JPG
2
DEX
1
ELF
1
JSON
1
File identification
MD5 d92f6ff2879a79d8f565d9dced691a3f
SHA1 2de63ff7ea0f0dc5fa948945321bfa0cfcab9f6c
SHA256 1bce228eba701f6b77f11c1be82cc8433537838b1eff4b09080838b9d6e2e449
ssdeep
786432:83q8rjrgMRaZlCF2e4vnAnWLy8QlLMGNYg6LajAU662z4r+qMDsNmwasI7Go:SjrAbQWnD28wICV8ajAUrMQ+3gNTaj

File size 45.2 MB ( 47422445 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
checks-gps ext-prg contains-elf apk dyn-calls android

VirusTotal metadata
First submission 2015-01-06 13:50:48 UTC ( 4 years, 4 months ago )
Last submission 2016-06-17 00:11:19 UTC ( 2 years, 11 months ago )
File names yhdg_1418106649974.apk
Galaxy Empire .apk
galaxy-empire.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.READ_PHONE_STATE:com.tap4fun.ge
android.permission.ACCESS_FINE_LOCATION:com.tap4fun.ge
android.permission.ACCESS_COARSE_LOCATION:com.tap4fun.ge
android.permission.ACCESS_WIFI_STATE:com.tap4fun.ge
android.permission.ACCESS_NETWORK_STATE:com.tap4fun.ge
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
External programs launched
/system/xbin/which su
Opened files
/data/data/com.tap4fun.ge/files/AppEventsLogger.persistedevents
/data/data/com.tap4fun.ge/files/mobclick_agent_cached_com.tap4fun.ge
/data/app/com.tap4fun.ge-1.apk
/data/data/com.tap4fun.ge/cache/volley
/data/data/com.tap4fun.ge/files/AFRequestCache
/data/data/com.tap4fun.ge/cache/__chartboost/CBRequestManager
/data/data/com.tap4fun.ge/cache/__chartboost/CBSessionDirectory
/data/data/com.tap4fun.ge/files
APP_ASSETS/tap4fun.zip
/data/data/com.tap4fun.ge/cache/__chartboost/CBSessionDirectory/cb_previous_session_info
/data/data/com.tap4fun.ge/files/.flurryagent.10c7c32f
/data/data/com.tap4fun.ge/cache/__chartboost/CBRequestManager/540320858111
/mnt/sdcard/tap4fun
/mnt/sdcard/tap4fun/galaxy_empire
/mnt/sdcard/tap4fun/galaxy_empire/AppOriginalData
/mnt/sdcard/tap4fun/galaxy_empire/AppOriginalData/Android
/mnt/sdcard
Accessed files
/data/data/com.tap4fun.ge/files
/system/app/Superuser.apk
/data/data/com.tap4fun.ge/cache/volley
/data/data/com.tap4fun.ge/cache/__chartboost/CBRequestManager
/data/data/com.tap4fun.ge/files/AFRequestCache
/mnt/sdcard/tap4fun/galaxy_empire/AppOriginalData/Android
/mnt/sdcard
/data/data/com.tap4fun.ge/files/.flurryagent.10c7c32f
/data/data/com.tap4fun.ge/files/.flurryinstallreceiver.
/data/data/com.tap4fun.ge/files/AF_INSTALLATION
/data/data/com.tap4fun.ge/cache/__chartboost/CBSessionDirectory
/data/data/com.tap4fun.ge/cache/__chartboost/CBSessionDirectory/cb_previous_session_info
/data/data/com.tap4fun.ge/files/mobclick_agent_cached_com.tap4fun.ge
/data/data/com.tap4fun.ge/cache/__chartboost/CBRequestManager/540320858111
Deleted files
/data/data/com.tap4fun.ge/filesmobclick_agent_header_com.tap4fun.ge
/data/data/com.tap4fun.ge/filesmobclick_agent_cached_com.tap4fun.ge
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Dynamically called methods
android.telephony.TelephonyManager.getDeviceId
Contacted URLs
http://data.flurry.com/aap.do
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
http://alog.umeng.com/app_logs
http://apps.ad-x.co.uk/API/androidevent.php/oursecret=T4F11092013krJDr&udid=826062672318622&androidID=d592db85f2a1f712&macAddress=null&type=&storeAppID=&device_name=Nexus S&device_type=android&os_version=4.0.4&country_code=US&language=en&app_id=com.tap4fun.ge&fbattribution=null&event=open&data=&uagent=&currency=&idfa=&isLAT=false
http://apps.ad-x.co.uk/atrk/andrdapp/udid=826062672318622&androidID=d592db85f2a1f712&macAddress=null&type=&storeAppID=&device_name=Nexus S&device_type=android&os_version=4.0.4&country_code=US&language=en&app_id=com.tap4fun.ge&clientid=T4F11092013krJDr&app_version=1.9.15&tag_version=3.1.3&fbattribution=null&uagent=&update=0&idfa=&isLAT=false
http://apps.ad-x.co.uk/API/androidevent.php/oursecret=T4F11092013krJDr&udid=826062672318622&androidID=d592db85f2a1f712&macAddress=null&type=&storeAppID=&device_name=Nexus S&device_type=android&os_version=4.0.4&country_code=US&language=en&app_id=com.tap4fun.ge&fbattribution=null&event=Launch&data=&uagent=&currency=&idfa=&isLAT=false
https://6612.engine.mobileapptracking.com/serve/ver=3.2.4&sdk=android&advertiser_id=6612&site_id=15220&action=session&package_name=com.tap4fun.ge&transaction_id=650ba6d5-901e-462b-8e81-ea23164dbfd9&data=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
https://track.appsflyer.com/api/v2.3/androidevent?buildnumber=1.7&app_id=com.tap4fun.ge
http://track.appsflyer.com/api/v2.3/androidevent?buildnumber=1.7&app_id=com.tap4fun.ge
https://api.appsflyer.com/install_data/v3/com.tap4fun.ge?devkey=sFg5sWnDDyejXHN8ugzZMU&device_id=5146664f-24ef-486b-912f-d1f6633cae2c
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
https://live.chartboost.com/api/config
https://live.chartboost.com/more/get
https://live.chartboost.com/interstitial/get
https://live.chartboost.com/api/install