× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 255581ba1b70240ec9d3330703b5f3fc60147178fb1c574154010a5b4123f1d2
File name: 1439314203_com.sm.subwayskates3d.apk
Detection ratio: 15 / 57
Analysis date: 2016-05-30 03:32:13 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
AegisLab Adware.Androidos.Xynyin!c 20160530
Antiy-AVL Trojan/AndroidOS.TSGeneric 20160530
AVware Trojan.AndroidOS.Generic.A 20160530
Bkav Android.Adware.RevMob.2EAC 20160528
CAT-QuickHeal Android.Xynyin.C (PUP) 20160528
Cyren AndroidOS/GenPua.8BCCDA69!Olympus 20160530
DrWeb Android.Xiny.19.origin 20160530
ESET-NOD32 a variant of Android/Riskware.Bauts.A 20160529
Fortinet Adware/RevMob!Android 20160530
Ikarus PUA.AndroidOS.RevMob 20160529
Kaspersky not-a-virus:HEUR:AdWare.AndroidOS.Xynyin.g 20160530
McAfee Artemis!BF74B6A86658 20160530
McAfee-GW-Edition Artemis!BF74B6A86658 20160530
NANO-Antivirus Riskware.Android.Revmob.dvcksa 20160530
VIPRE Trojan.AndroidOS.Generic.A 20160530
Ad-Aware 20160530
AhnLab-V3 20160529
Alibaba 20160530
ALYac 20160530
Arcabit 20160530
Avast 20160530
AVG 20160530
Avira (no cloud) 20160529
Baidu 20160527
Baidu-International 20160529
BitDefender 20160530
ClamAV 20160530
CMC 20160523
Comodo 20160530
Emsisoft 20160530
F-Prot 20160530
F-Secure 20160530
GData 20160530
Jiangmin 20160530
K7AntiVirus 20160529
K7GW 20160530
Kingsoft 20160530
Malwarebytes 20160530
Microsoft 20160530
eScan 20160529
nProtect 20160527
Panda 20160529
Qihoo-360 20160530
Rising 20160530
Sophos AV 20160530
SUPERAntiSpyware 20160529
Symantec 20160530
Tencent 20160530
TheHacker 20160528
TotalDefense 20160530
TrendMicro 20160530
TrendMicro-HouseCall 20160530
VBA32 20160527
ViRobot 20160530
Yandex 20160530
Zillya 20160528
Zoner 20160530
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.sm.subwayskates3d. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 20.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.sm.subwayskates3d.UnityPlayerProxyActivity
com.sm.subwayskates3d.UnityPlayerActivity
com.sm.subwayskates3d.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.revmob.ads.fullscreen.FullscreenActivity
com.startapp.android.publish.list3d.List3DActivity
com.startapp.android.publish.AppWallActivity
com.appnext.appnextsdk.PopupActivity
com.appodeal.ads.AdActivity
com.appodeal.ads.LoaderActivity
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.applovin.adview.AppLovinInterstitialActivity
com.mopub.mobileads.MoPubActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidActivity
com.mopub.mobileads.MraidVideoPlayerActivity
org.nexage.sourcekit.mraid.MRAIDBrowser
com.amazon.device.ads.AdActivity
com.facebook.ads.InterstitialAdActivity
com.revmob.ads.fullscreen.FullscreenActivity
org.onepf.openiab.UnityProxyActivity
grq.wxvqsmwg.toyhjrWfm.jxpmBhceqsf.JxpmBhEevjwkvz
grq.wxvqsmwg.toyhjrWfm.toyhjrceqsf.ZlixJrPqql
Services
com.appnext.appnextsdk.DownloadService
com.ironsource.mobilcore.MobileCoreReport
grq.wxvqsmwg.toyhjrWfm.toyhjrceqsf.QdmoDxvnUfsxkdf
com.wch.c_direct.MyService
Receivers
com.ironsource.mobilcore.InstallationTracker
net.agasper.unitynotification.UnityNotificationManager
grq.wxvqsmwg.toyhjrWfm.toyhjrceqsf.MainBeginRcvSomeThing
com.wch.c_direct.MyReceiver
com.ltstat.core.StatReceiver
Activity-related intent filters
grq.wxvqsmwg.toyhjrWfm.jxpmBhceqsf.JxpmBhEevjwkvz
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
grq.wxvqsmwg.toyhjrWfm.toyhjrceqsf.MainBeginRcvSomeThing
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.USER_PRESENT, android.intent.action.DATE_CHANGED
com.wch.c_direct.MyReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.UMS_CONNECTED, android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT, com.android.game.service.NOTIFY, com.qwer.rewq.alarmReceiver
categories: android.intent.category.HOME
com.ltstat.core.StatReceiver
actions: android.intent.action.USER_PRESENT, android.intent.action.DATE_CHANGED, android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.ltstat
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
234
Uncompressed size
62847187
Highest datetime
2015-07-22 10:28:30
Lowest datetime
2015-07-22 10:27:28
Contained files by extension
png
116
zip
14
xml
12
dll
9
so
4
txt
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
130
unknown
62
ZIP
14
XML
12
Portable Executable
9
ELF
4
DEX
1
JPG
1
HTML
1
File identification
MD5 8bccda69e42a4bbdf78b1a204d1d85d3
SHA1 9c1fb0981809b9ed3ded4d6dfdca83c4ec4d89b9
SHA256 255581ba1b70240ec9d3330703b5f3fc60147178fb1c574154010a5b4123f1d2
ssdeep
393216:jMrdpj5N5D2V7aFj+ifGauZNwT5kKPqDzWRKx4K+ML+TM2sqyVjQ5/+CsH0tBtzb:jKdKm6iOrvcBKmU7VUwHgBtzym

File size 21.8 MB ( 22846938 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-08-07 08:25:41 UTC ( 3 years, 2 months ago )
Last submission 2016-05-30 03:32:13 UTC ( 2 years, 4 months ago )
File names 45_com.sm.subwayskates3d.apk
1439314203_com.sm.subwayskates3d.apk
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0216.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!