× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 1fedeca8b3372a1c0f6daed0a96634a4fc13c222dedd31cc7c7e3a1cc5ff9347
File name: 1FEDECA8B3372A1C0F6DAED0A96634A4FC13C222DEDD31CC7C7E3A1CC5FF9347
Detection ratio: 0 / 61
Analysis date: 2018-12-01 03:54:11 UTC ( 5 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181201
AegisLab 20181201
AhnLab-V3 20181130
Alibaba 20180921
ALYac 20181201
Antiy-AVL 20181201
Arcabit 20181130
Avast 20181201
Avast-Mobile 20181130
AVG 20181201
Avira (no cloud) 20181130
Babable 20180918
Baidu 20181130
BitDefender 20181201
Bkav 20181129
CAT-QuickHeal 20181130
ClamAV 20181130
CMC 20181130
Comodo 20181201
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181201
Cyren 20181201
DrWeb 20181201
eGambit 20181201
Emsisoft 20181201
Endgame 20181108
ESET-NOD32 20181201
F-Prot 20181201
F-Secure 20181201
Fortinet 20181201
GData 20181201
Ikarus 20181130
Sophos ML 20181128
Jiangmin 20181201
K7AntiVirus 20181130
K7GW 20181201
Kaspersky 20181201
Kingsoft 20181201
Malwarebytes 20181201
MAX 20181201
McAfee 20181201
McAfee-GW-Edition 20181201
Microsoft 20181201
eScan 20181201
NANO-Antivirus 20181201
Palo Alto Networks (Known Signatures) 20181201
Panda 20181130
Qihoo-360 20181201
Rising 20181201
SentinelOne (Static ML) 20181011
Sophos AV 20181201
SUPERAntiSpyware 20181128
Symantec 20181201
Symantec Mobile Insight 20181121
TACHYON 20181201
Tencent 20181201
TheHacker 20181129
TotalDefense 20181130
Trapmine 20181128
TrendMicro 20181201
TrendMicro-HouseCall 20181201
Trustlook 20181201
VBA32 20181130
VIPRE 20181130
ViRobot 20181130
Webroot 20181201
Yandex 20181130
Zillya 20181130
ZoneAlarm by Check Point 20181201
Zoner 20181201
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.com2us.smon.normal.freefull.google.kr.android.common. The internal version number of the application is 41200. The displayed version string of the application is 4.1.2. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_CONTACTS (read contact data)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.com2us.smon.normal.freefull.google.kr.android.common.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.UPDATE_DEVICE_STATS (modify battery statistics)
android.permission.RECORD_AUDIO (record audio)
Activities
com.com2us.smon.normal.freefull.google.kr.android.common.SubActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.com2us.module.activeuser.useragree.AgreementUIActivity
com.facebook.FacebookActivity
com.com2us.module.inapp.lebi.WeChatPayActivity
com.com2us.module.push.ShowMsgActivity
com.com2us.module.push.NotificationMessage
com.com2us.module.push.PushWakeLock
com.com2us.smon.common.Com2usWebView
com.com2us.smon.common.Com2usMediaPlayerActivity
com.com2us.smon.common.Com2usScreenRecordAfter
com.com2us.module.mercury.MercuryVideoActivity
Services
com.com2us.backgrounddownload.DownloadService
com.com2us.module.activeuser.downloadcheck.InstallService
com.android.vending.billing.BillingService
com.com2us.module.fcm.MessagingService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.com2us.smon.common.CommonReceiver
com.com2us.module.activeuser.downloadcheck.InstallReceiver
it.partytrack.sdk.ReferrerReceiver
com.adpick.advertiser.sdk.InstallReceiver
com.android.vending.billing.BillingReceiver
com.com2us.module.push.LocalPushReceiver
com.com2us.module.push.DeviceStatusReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
android.support.v4.content.FileProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.com2us.module.fcm.MessagingService
actions: com.google.firebase.MESSAGING_EVENT
Activity-related intent filters
com.com2us.smon.normal.freefull.google.kr.android.common.SubActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
actions: com.google.firebase.INSTANCE_ID_EVENT
com.com2us.module.push.DeviceStatusReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.TIME_SET
categories: com.com2us.smon.normal.freefull.google.kr.android.common
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.com2us.smon.normal.freefull.google.kr.android.common
com.com2us.smon.common.CommonReceiver
actions: com.android.vending.INSTALL_REFERRER
com.android.vending.billing.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
936
Uncompressed size
47896076
Highest datetime
2018-10-26 10:11:40
Lowest datetime
1980-01-01 09:00:00
Contained files by extension
png
594
xml
259
jpg
47
so
6
sox
4
js
2
dex
1
mf
1
crt
1
RSA
1
dat
1
mp4
1
MF
1
txt
1
SF
1
Contained files by type
PNG
631
XML
258
unknown
35
OGG
8
ELF
3
DEX
1
File identification
MD5 f7b231f0e0439191b10c04fe50af2214
SHA1 c97a2f6904b88fd0a5419cbc96aa378f67285287
SHA256 1fedeca8b3372a1c0f6daed0a96634a4fc13c222dedd31cc7c7e3a1cc5ff9347
ssdeep
786432:m0s26VJhzJd5EHrp31RJ7ad+bVy05RESI19Lv3J5/:m0Z6zJ0HVFRAd+Ry0YSI19LvJJ

File size 28.8 MB ( 30166219 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-10-29 05:02:39 UTC ( 6 months, 3 weeks ago )
Last submission 2018-12-14 09:20:03 UTC ( 5 months ago )
File names osaamqRte7oKs1j0wS7xd3wJbFbynrBHfeAlMaM
ssomOOJQZQwr9RXwePGnbwWzoQZZDsXNzhquv
soasxF3MuZV3LbFcCpeJU1s80LLAMyIddhsSkLa8X
osamCi4qk9ncWdlBtLXqvV2QqdYCki
com.com2us.smon.normal.freefull.google.kr.android.common.apk
asaoUWzaaHaV0CKyny
aoamL2rgEIBxvWZzm1iY38FYPJkvkxN81s7PgToNXh
massijYtjVuvfzMNnXtP2PLeazBpza9WgjITQ6kJadgt
com.com2us.smon.normal.freefull.google.kr.android.common
ssoaXE5qkoYT0l
oaascyomPdp5EmVy4ljvOrqrQPksllWVNEu
masskiW41wUH9dhDQAX
aomsqZkfWFlBNt7uAuHPI1jkH2vDbBgfEref
f7b231f0e0439191b10c04fe50af2214.space
summoners-war-4-1-2.apk
osast0OFhwza3Onb2sIY2EXhy7RUC02TTXGM5t03QL42uB3
summoners-war-sky-arena.apk
saso61T6dC3BpKGh947k5esr5HnD2zn4AO
summoners-war-sky-arena-4.1.2.apk
maoaH0ltBsil30u3junnql1rOFQMJEA6KPeKOPduXAscyTvqT3Wgz
amasbmlxC1bkMFRO3y1bQ7LppUF0ScZKtfKXkxi1cYMQTnsY5RYMdXfWtdJc
ssaao6yxH5tVzFqqkExdlfyn6MBHt8ljcWb8LD6VRG3J8tNIvrYgFNVTSf7eQHs
saoaUDCy2W55AIP6pC0Jk9y
saoapVhRjEUbE0Pb4Nyaykm5Z6c7bkSYGs7
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!