× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 267a3129200ffd64870515ec4a628cdb3df8ec7e3cacc87804009d1078a1aea7
File name: Monkey It !-1.apk
Detection ratio: 0 / 34
Analysis date: 2012-10-31 15:37:02 UTC ( 4 years, 7 months ago ) View latest
Antivirus Result Update
Yandex 20121031
AntiVir 20121031
Antiy-AVL 20121027
Avast 20121031
AVG 20121031
BitDefender 20121031
CAT-QuickHeal 20121031
ClamAV 20121031
Commtouch 20121031
Comodo 20121031
Emsisoft 20121031
eSafe 20121028
ESET-NOD32 20121031
F-Prot 20121030
F-Secure 20121031
Fortinet 20121031
GData 20121031
Ikarus 20121031
Jiangmin 20121031
K7AntiVirus 20121030
Kaspersky 20121031
Kingsoft 20121028
eScan 20121031
Norman 20121031
nProtect 20121031
Panda 20121031
PCTools 20121031
Sophos 20121031
SUPERAntiSpyware 20121031
Symantec 20121031
TheHacker 20121031
TotalDefense 20121030
VIPRE 20121031
ViRobot 20121031
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.fibo.pnina. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
com.fibo.pnina.MainActivity
com.fibo.pnina.DisplayMessageActivity
com.sellaring.sdk.PostCallScreenActivity
Receivers
com.sellaring.sdk.AlarmReceiver
com.sellaring.sdk.RestartAlarmServiceReceiver
com.sellaring.sdk.PhoneStateReceiver
Activity-related intent filters
com.fibo.pnina.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.sellaring.sdk.RestartAlarmServiceReceiver
actions: android.intent.action.BOOT_COMPLETED
com.sellaring.sdk.PhoneStateReceiver
actions: android.intent.action.PHONE_STATE, android.intent.action.NEW_OUTGOING_CALL
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
17
Uncompressed size
560742
Highest datetime
2012-09-03 17:47:06
Lowest datetime
2012-09-03 14:56:46
Contained files by extension
png
7
xml
4
dex
1
MF
1
RSA
1
jpg
1
SF
1
Contained files by type
PNG
7
XML
4
unknown
4
DEX
1
JPG
1
File identification
MD5 48176b640fcf0ea21a3f3d5daaca9318
SHA1 1172b53af37115dc011a05a8c07d257517336bb7
SHA256 267a3129200ffd64870515ec4a628cdb3df8ec7e3cacc87804009d1078a1aea7
ssdeep
6144:HEgYu721dQ4pUTicSLmyNrVeI8gBC7E2AOjzitKHY+H:kgPqGrTickmyNrVeI8gBIE2AO6o4+H

File size 281.2 KB ( 287912 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2012-10-31 15:37:02 UTC ( 4 years, 7 months ago )
Last submission 2015-02-06 04:05:40 UTC ( 2 years, 4 months ago )
File names Monkey It !-1.apk
Monkey It !-1.apk
48176b640fcf0ea21a3f3d5daaca9318.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://prod.sellaring.com/mobileapi/SellAringSvc/Mobile/RegApp
3C3F786D6C2076657273696F6E3D27312E302720656E636F64696E673D275554462D3827207374616E64616C6F6E653D2779657327203F3E3C7265717565737420676D744F66667365743D2231323022206465766963653D22323938386430633233393831633864366138623761623861356538633362336122206170706C69636174696F6E3D22393836303231323635222073646B56657273696F6E3D22312E312E302E38302220706B674E616D653D22636F6D2E6669626F2E706E696E61223E3C7061636B6167654E616D653E636F6D2E6669626F2E706E696E613C2F7061636B6167654E616D653E3C6F7356657273696F6E3E31353C2F6F7356657273...