× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 233930c6af5fe0291c722a3d957a0aa72232643409c4e7a63516849d5875902e
File name: 1381594770_pazly-kartinki-jigty-v1.2.apk
Detection ratio: 10 / 56
Analysis date: 2016-06-26 19:48:15 UTC ( 2 years, 2 months ago ) View latest
Antivirus Result Update
AegisLab Adwareare.Andr.Domob.H!c 20160624
Antiy-AVL Trojan/AndroidOS.TSGeneric 20160626
AVG Android/Domob 20160626
Avira (no cloud) ADWARE/ANDR.Domob.H.Gen 20160626
AVware Trojan.AndroidOS.Generic.A 20160626
CAT-QuickHeal Android.Domob.A (AdWare) 20160625
ESET-NOD32 a variant of Android/Domob.C potentially unwanted 20160626
Fortinet Adware/Domob!Android 20160626
Ikarus PUA.AndroidOS.Domob 20160626
Sophos AV Android Multi Ads (PUA) 20160626
Ad-Aware 20160626
AhnLab-V3 20160626
Alibaba 20160624
ALYac 20160626
Arcabit 20160626
Avast 20160626
Baidu 20160624
Baidu-International 20160614
BitDefender 20160626
Bkav 20160625
ClamAV 20160626
CMC 20160620
Comodo 20160626
Cyren 20160626
DrWeb 20160626
Emsisoft 20160626
F-Prot 20160626
F-Secure 20160626
GData 20160626
Jiangmin 20160626
K7AntiVirus 20160626
K7GW 20160626
Kaspersky 20160626
Kingsoft 20160626
Malwarebytes 20160626
McAfee 20160626
McAfee-GW-Edition 20160626
Microsoft 20160626
eScan 20160626
NANO-Antivirus 20160626
nProtect 20160624
Panda 20160626
Qihoo-360 20160626
SUPERAntiSpyware 20160626
Symantec 20160626
Tencent 20160626
TheHacker 20160625
TotalDefense 20160626
TrendMicro 20160626
TrendMicro-HouseCall 20160626
VBA32 20160625
VIPRE 20160626
ViRobot 20160626
Yandex 20160625
Zillya 20160625
Zoner 20160626
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.outfit7.jigtyfree. The internal version number of the application is 7. The displayed version string of the application is 1.2. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.outfit7.jigtyfree.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.outfit7.jigtyfree.Main
com.outfit7.jigtyfree.Preferences
com.outfit7.jigtyfree.CropActivity
com.vungle.sdk.VungleAdvert
com.flurry.android.FlurryFullscreenTakeoverActivity
com.facebook.LoginActivity
Services
com.outfit7.funnetworks.push.GcmIntentService
Receivers
com.outfit7.jigtyfree.LocalReminder
com.outfit7.jigtyfree.LocalReminderReboot
com.outfit7.funnetworks.InstallReferrer
com.outfit7.funnetworks.push.O7GcmBroadcastReceiver
Activity-related intent filters
com.outfit7.jigtyfree.Main
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.outfit7.jigtyfree.Preferences
actions: android.intent.action.MAIN
categories: android.intent.category.ALTERNATIVE
com.outfit7.jigtyfree.CropActivity
actions: android.intent.action.MAIN
categories: android.intent.category.ALTERNATIVE
Receiver-related intent filters
com.outfit7.jigtyfree.LocalReminderReboot
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT
com.outfit7.funnetworks.push.O7GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.outfit7.jigtyfree
com.outfit7.funnetworks.InstallReferrer
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1156
Uncompressed size
24846351
Highest datetime
2013-10-11 22:34:36
Lowest datetime
2013-10-11 22:33:40
Contained files by extension
jpg
464
png
439
xml
77
mp3
3
txt
1
otf
1
m4a
1
Contained files by type
JPG
464
PNG
439
XML
77
HTML
12
unknown
7
MP3
1
File identification
MD5 095a7e668ea9bf6565f771a99b058bdd
SHA1 c3917486b6590c6a48cb788885e51cf8dde6eeed
SHA256 233930c6af5fe0291c722a3d957a0aa72232643409c4e7a63516849d5875902e
ssdeep
786432:lL5PXAx71SoJZCDY6+uEmuz0f/p1t3p0s45EuYDnvVK3SS1T:lL2G+4YbuEmWMNp0s4iJnM3SSt

File size 28.1 MB ( 29455016 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (56.7%)
Java Archive (15.6%)
BlueEyes Animation (14.5%)
Mozilla Firefox browser extension (8.6%)
ZIP compressed archive (4.3%)
Tags
apk android

VirusTotal metadata
First submission 2013-10-12 17:35:48 UTC ( 4 years, 11 months ago )
Last submission 2016-06-26 19:48:15 UTC ( 2 years, 2 months ago )
File names 1381594770_pazly-kartinki-jigty-v1.2.apk
233930C6AF5FE0291C722A3D957A0AA72232643409C4E7A63516849D5875902E
jigty-puzzles-v1.2.apk
c3917486b6590c6a48cb788885e51cf8dde6eeed
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!