× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 25e6c96e7727e862be4a69f9b3f2353e7fed0a08644a6760a937f11ab37e21e9
File name: 25e6c96e7727e862be4a69f9b3f2353e7fed0a08644a6760a937f11ab37e21e9
Detection ratio: 1 / 62
Analysis date: 2017-07-15 02:25:33 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Symantec Mobile Insight AdLibrary:MoPub 20170713
Ad-Aware 20170715
AegisLab 20170715
AhnLab-V3 20170714
Alibaba 20170714
ALYac 20170715
Antiy-AVL 20170715
Arcabit 20170715
Avast 20170715
AVG 20170715
Avira (no cloud) 20170714
AVware 20170715
Baidu 20170714
BitDefender 20170715
Bkav 20170714
CAT-QuickHeal 20170714
ClamAV 20170715
CMC 20170714
Comodo 20170715
CrowdStrike Falcon (ML) 20170710
Cylance 20170715
Cyren 20170715
DrWeb 20170715
Emsisoft 20170715
Endgame 20170713
ESET-NOD32 20170715
F-Prot 20170715
F-Secure 20170714
Fortinet 20170629
GData 20170715
Ikarus 20170714
Sophos ML 20170607
Jiangmin 20170715
K7AntiVirus 20170714
K7GW 20170715
Kaspersky 20170714
Kingsoft 20170715
Malwarebytes 20170715
MAX 20170715
McAfee 20170715
McAfee-GW-Edition 20170715
Microsoft 20170715
eScan 20170715
NANO-Antivirus 20170715
nProtect 20170715
Palo Alto Networks (Known Signatures) 20170715
Panda 20170714
Qihoo-360 20170715
Rising 20170715
SentinelOne (Static ML) 20170516
Sophos AV 20170715
SUPERAntiSpyware 20170715
Symantec 20170714
Tencent 20170715
TheHacker 20170712
TotalDefense 20170714
TrendMicro 20170715
TrendMicro-HouseCall 20170715
Trustlook 20170715
VBA32 20170714
VIPRE 20170715
ViRobot 20170715
Webroot 20170715
WhiteArmor 20170713
Yandex 20170714
Zillya 20170714
ZoneAlarm by Check Point 20170715
Zoner 20170715
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nekki.shadowfight. The internal version number of the application is 1000075. The displayed version string of the application is 1.9.11. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.nekki.shadowfight.permission.C2D_MESSAGE (C2DM permission.)
com.android.alarm.permission.SET_ALARM (set alarm in alarm clock)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.SET_ORIENTATION (change screen orientation)
com.google.android.c2dm.permission.REGISTRATION (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nekki.shadowfight.Main
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.chartboost.sdk.CBImpressionActivity
com.flurry.android.CatalogActivity
com.ideaworks3d.marmalade.s3eAndroidGooglePlayBilling.PurchaseProxy
com.facebook.LoginActivity
com.burstly.lib.component.networkcomponent.burstly.BurstlyFullscreenActivity
com.google.ads.AdActivity
com.greystripe.sdk.GSFullscreenActivity
com.inmobi.androidsdk.IMBrowserActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.burstly.lib.component.networkcomponent.jumptap.JumptapActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.vungle.sdk.VungleAdvert
s3esponsorpay.s3eSPBrandEngageActivity
s3esponsorpay.OfferWallActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.vungle.publisher.FullScreenAdActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
net.metaps.sdk.WallActivity
net.metaps.sdk.StatusActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.chartboost.sdk.CBImpressionActivity
Services
com.hullabu.ac3.HullabuDownloaderService
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyDownloaderService
com.vungle.sdk.VungleIntentService
com.vungle.publisher.VungleService
com.hullabu.ac3.HullabuDownloaderService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.nekki.androidnotifications.TimeAlarm
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyAlarmReceiver
com.sponsorpay.advertiser.InstallReferrerReceiver
com.tapjoy.InstallReferrerReceiver
com.tapjoy.GCMReceiver
com.tapjoy.TapjoyReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.hullabu.ac3.TimeAlarm
com.marmalade.studio.android.gcm.s3eGCMClientLocalReceiver
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
Providers
com.ideaworks3d.marmalade.VFSProvider
Activity-related intent filters
com.nekki.shadowfight.Main
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, tv.ouya.intent.category.GAME
com.flurry.android.CatalogActivity
actions: s3e.offer.intent
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nekki.shadowfight
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.sponsorpay.advertiser.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.GCMReceiver
actions: com.google.android.c2dm.intent.REGISTRATION, com.google.android.c2dm.intent.RECEIVE, com.google.android.gcm.intent.RETRY
categories: com.nekki.shadowfight
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
504
Uncompressed size
56704981
Highest datetime
2015-09-03 18:08:46
Lowest datetime
2015-09-03 18:07:34
Contained files by extension
png
205
xml
155
wav
77
so
30
mp3
7
icf
4
nib
3
sql
3
txt
3
dz
2
dex
1
MF
1
RSA
1
js
1
mp4
1
xsd
1
s3e
1
SF
1
Contained files by type
PNG
205
XML
155
unknown
104
ELF
30
MP3
7
HTML
2
DEX
1
File identification
MD5 bab952cef0be6d7579eb90072dea36fd
SHA1 f597bbbb6b6df50de27b152b7293c05cb3aa7a7a
SHA256 25e6c96e7727e862be4a69f9b3f2353e7fed0a08644a6760a937f11ab37e21e9
ssdeep
786432:5a0tuBup3loY2gUWlz8p8VzPcbYTxqSQapAZkgycfMf3ey33no9F:U0QBup3lWgUWloYndfQzkCf43NnoT

File size 47.8 MB ( 50095756 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (40.6%)
SPSS Extension (23.2%)
Nokia S60 Web Runtime Widget Package (16.2%)
Java Archive (11.2%)
Mozilla Archive Format (gen) (5.4%)
Tags
apk android dyn-calls contains-elf

VirusTotal metadata
First submission 2015-09-03 22:46:06 UTC ( 3 years, 8 months ago )
Last submission 2018-02-24 08:59:50 UTC ( 1 year, 2 months ago )
File names shadow-fight-2.apk
shadow-fight-2-1-9-11-multi-android.apk
com.nekki.shadowfight-1.apk
Shadow Fight 2 1.9.11.apk
shadow-fight-2-v1-9-11.apk
Shadow_Fight_2_v1.9.11.apk
shadow_fight_2_-1443021679-www.androeed.ru.apk
471589_4e0835_com.nekki.shadowfight.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/com.nekki.shadowfight/files/AppEventsLogger.persistedevents
/data/data/com.nekki.shadowfight/cache/volley
/data/data/com.nekki.shadowfight/cache/__chartboost/CBTrackingDirectory
/data/data/com.nekki.shadowfight/cache/__chartboost/CBRequestManager
/data/data/com.nekki.shadowfight/cache/__chartboost/CBSessionDirectory
/mnt/sdcard/__chartboost/CBVideoDirectory
/mnt/sdcard/__chartboost/CBImagesDirectory
/data/data/com.nekki.shadowfight/cache/__chartboost/CBVideoCompletion
/data/data/com.nekki.shadowfight/files/makeramdirectory.txt
/data/data/com.nekki.shadowfight/files
/mnt/sdcard
/data/data/com.nekki.shadowfight/cache
/mnt/sdcard/Android/data/com.nekki.shadowfight/cache
Accessed files
/data/data/com.nekki.shadowfight/cache/volley
/data/data/com.nekki.shadowfight/cache/__chartboost/CBRequestManager
/data/data/com.nekki.shadowfight/cache/__chartboost/CBTrackingDirectory
/data/data/com.nekki.shadowfight/cache/__chartboost/CBSessionDirectory
/mnt/sdcard/__chartboost/CBVideoDirectory
/mnt/sdcard/__chartboost/CBImagesDirectory
/mnt/sdcard/__chartboost/CBImagesDirectory/.nomedia
/mnt/sdcard/__chartboost/CBVideoDirectory/.nomedia
/data/data/com.nekki.shadowfight/cache/__chartboost/CBVideoCompletion
/data/data/com.nekki.shadowfight/cache/__chartboost/CBSessionDirectory/cb_previous_session_info
/system/app/Superuser.apk
/sbin/su
/system/bin/su
/system/xbin/su
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically called methods
android.content.Context.getExternalCacheDir
android.content.pm.PackageManager.hasSystemFeature 1 argument.
u'android.hardware.touchscreen.multitouch'
Contacted URLs
https://live.chartboost.com/api/config
Accessed URIs
content://zzzz768b4dcde01d5dbb117274855b95a3a8.VFSProvider
content://com.facebook.katana.provider.AttributionIdProvider
https://live.chartboost.com/api/config