× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1d78aa24ecf48dbc9c44b5c535ac576fc6408adfe7b586745cf74c773169657a
File name: 1408730404_com.lego.bricksmore.apk
Detection ratio: 0 / 61
Analysis date: 2017-05-06 03:51:49 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170506
AegisLab 20170506
AhnLab-V3 20170505
Alibaba 20170505
ALYac 20170506
Antiy-AVL 20170506
Arcabit 20170506
Avast 20170506
AVG 20170506
Avira (no cloud) 20170505
AVware 20170506
Baidu 20170503
BitDefender 20170506
Bkav 20170505
CAT-QuickHeal 20170505
ClamAV 20170505
CMC 20170505
Comodo 20170506
CrowdStrike Falcon (ML) 20170130
Cyren 20170506
DrWeb 20170506
Emsisoft 20170506
Endgame 20170503
ESET-NOD32 20170505
F-Prot 20170506
F-Secure 20170506
Fortinet 20170506
GData 20170506
Ikarus 20170505
Sophos ML 20170413
Jiangmin 20170506
K7AntiVirus 20170505
K7GW 20170505
Kaspersky 20170506
Kingsoft 20170506
Malwarebytes 20170506
McAfee 20170506
McAfee-GW-Edition 20170505
Microsoft 20170506
eScan 20170505
NANO-Antivirus 20170505
nProtect 20170506
Palo Alto Networks (Known Signatures) 20170506
Panda 20170505
Qihoo-360 20170506
Rising 20170506
SentinelOne (Static ML) 20170330
Sophos AV 20170506
SUPERAntiSpyware 20170506
Symantec 20170505
Symantec Mobile Insight 20170504
Tencent 20170506
TheHacker 20170505
TotalDefense 20170505
TrendMicro 20170506
TrendMicro-HouseCall 20170506
Trustlook 20170506
VBA32 20170505
VIPRE 20170506
ViRobot 20170506
Webroot 20170506
WhiteArmor 20170502
Yandex 20170504
Zillya 20170505
ZoneAlarm by Check Point 20170506
Zoner 20170506
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.lego.bricksmore. The internal version number of the application is 7. The displayed version string of the application is 2.0.2. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.INTERNET (full Internet access)
Activities
com.prime31.UnityPlayerNativeActivity
com.prime31.EtceteraProxyActivity
com.prime31.WebViewActivity
com.prime31.P31VideoPlayerActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
Receivers
com.prime31.AlarmManagerReceiver
Activity-related intent filters
com.prime31.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
224
Uncompressed size
170146035
Highest datetime
2014-02-03 10:45:22
Lowest datetime
2013-12-12 00:55:44
Contained files by extension
dll
7
png
6
so
3
xml
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
205
Portable Executable
7
PNG
6
ELF
3
XML
2
DEX
1
File identification
MD5 cb553aef93b41bd4048cbb220e5b6da3
SHA1 9052e2947efb2bfa3fda3155db8196d6d83895f4
SHA256 1d78aa24ecf48dbc9c44b5c535ac576fc6408adfe7b586745cf74c773169657a
ssdeep
786432:Z7RIWG1feWLnYAFz58l7Hrp6TCTwlxnrIwP65dicmL7y79FaKFZaJy:Tzqf7LYAFz5s7Hr4mExnrIG65dsy76K

File size 37.0 MB ( 38790682 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe software-collection android contains-elf

VirusTotal metadata
First submission 2014-02-07 13:19:41 UTC ( 4 years, 11 months ago )
Last submission 2017-06-21 12:18:25 UTC ( 1 year, 7 months ago )
File names LEGO_Juniors.apk
com.lego.bricksmore_2.0.2.apk
d520d4964a274f008647e98caa3dbc6e.apk
1408730404_com.lego.bricksmore.apk
com.lego.bricksmore_7.apk
乐高组装.apk
lego-juniors-create-and-cruise-2-0-2-en-android.apk
lego-app4.apk
LEGO_Juniors_2.0.2.apk
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.lego.bricksmore/files
APP_ASSETS/bin/Data/settings.xml
/data/data/com.lego.bricksmore/files/.flurryagent.22175400
/data/data/com.lego.bricksmore/files/.flurrydatasenderblock.870fc0ee-6211-45bb-99e4-0201a879d774
/data/data/com.lego.bricksmore/files/.FlurrySenderIndex.info.Data_AIA6LPSFCP3AGNDM1X4N_151
/data/data/com.lego.bricksmore/files/.FlurrySenderIndex.info.Main
Accessed files
/data/app/com.lego.bricksmore-1.apk/assets/bin/Data/settings.xml
/data/data/com.lego.bricksmore/files/.FlurrySenderIndex.info.Main
/data/data/com.lego.bricksmore/files/.flurryagent.22175400
/data/data/com.lego.bricksmore/files/.flurryinstallreceiver.
/data/data/com.lego.bricksmore/files
/data/data/com.lego.bricksmore/files/.flurrydatasenderblock.870fc0ee-6211-45bb-99e4-0201a879d774
/data/data/com.lego.bricksmore/files/.FlurrySenderIndex.info.Data_AIA6LPSFCP3AGNDM1X4N_151
Contacted URLs
http://data.flurry.com/aap.do
001B000000000000000000000000000300970000013A46921D800014414941364C50534643503341474E444D3158344E0005322E302E32000100000013414E446663396531623633303366306538633700000000013A46921BAA0000013A46921BAA0006000C6465766963652E6D6F64656C00074E657875732053000B6275696C642E6272616E640006676F6F676C6500086275696C642E696400064A524F303345000F76657273696F6E2E72656C656173650005342E302E34000C6275696C642E646576696365000663726573706F000D6275696C642E70726F647563740004736F6A7500000000000000388DB574