× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 28a62db786b51dea3af2875e323d25eff4767e9d31b0a9e27919d7af8c4f4a40
File name: 985595_a31fed_io.meduza.android_6.3.8_638.apk
Detection ratio: 0 / 56
Analysis date: 2019-03-03 20:25:14 UTC ( 2 months, 3 weeks ago )
Antivirus Result Update
Acronis 20190222
Ad-Aware 20190303
AegisLab 20190303
AhnLab-V3 20190303
Alibaba 20180921
Antiy-AVL 20190303
Arcabit 20190303
Avast 20190303
Avast-Mobile 20190303
AVG 20190303
Avira (no cloud) 20190303
Babable 20180918
Baidu 20190215
BitDefender 20190303
Bkav 20190301
CAT-QuickHeal 20190303
ClamAV 20190303
CMC 20190303
Comodo 20190303
CrowdStrike Falcon (ML) 20190212
Cybereason 20190109
Cyren 20190303
DrWeb 20190303
eGambit 20190303
Emsisoft 20190303
Endgame 20190215
ESET-NOD32 20190303
F-Prot 20190303
F-Secure 20190303
Fortinet 20190303
GData 20190303
Ikarus 20190303
Sophos ML 20181128
Jiangmin 20190303
K7AntiVirus 20190303
K7GW 20190303
Kaspersky 20190303
Kingsoft 20190303
Malwarebytes 20190303
MAX 20190303
McAfee 20190303
McAfee-GW-Edition 20190303
Microsoft 20190303
eScan 20190303
NANO-Antivirus 20190303
Palo Alto Networks (Known Signatures) 20190303
Panda 20190303
Qihoo-360 20190303
SentinelOne (Static ML) 20190203
Sophos AV 20190303
SUPERAntiSpyware 20190227
Symantec 20190303
Symantec Mobile Insight 20190220
TACHYON 20190303
Tencent 20190303
TheHacker 20190225
TotalDefense 20190303
Trapmine 20190301
Trustlook 20190303
VBA32 20190301
VIPRE 20190303
ViRobot 20190303
Webroot 20190303
Yandex 20190301
ZoneAlarm by Check Point 20190303
Zoner 20190303
The file being studied is Android related! APK Android file more specifically. The application's main package name is io.meduza.android. The internal version number of the application is 638. The displayed version string of the application is 6.3.8. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
android.permission.VIBRATE (control vibrator)
io.meduza.android.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
io.meduza.android.activities.TvActivity
io.meduza.android.activities.IncomingPushActivity
io.meduza.android.activities.DeepLinkingActivity
io.meduza.android.activities.NewsActivity
io.meduza.android.activities.NewsSingleListActivity
io.meduza.android.activities.NewsDescActivity
io.meduza.android.activities.SearchActivity
io.meduza.android.activities.InformationActivity
io.meduza.android.activities.SettingsActivity
io.meduza.android.activities.SettingsNotificationActivity
io.meduza.android.activities.GalleryActivity
io.meduza.android.activities.BookmarksActivity
com.google.android.gms.ads.AdActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.mopub.common.privacy.ConsentDialogActivity
com.facebook.ads.AudienceNetworkActivity
com.google.android.gms.common.api.GoogleApiActivity
com.twitter.sdk.android.tweetui.PlayerActivity
com.twitter.sdk.android.tweetui.GalleryActivity
com.twitter.sdk.android.tweetcomposer.ComposerActivity
com.twitter.sdk.android.core.identity.OAuthActivity
Services
io.meduza.android.services.EpisodeDownloadService
io.meduza.android.services.PlayerService
io.meduza.android.services.ListenerFromWearService
io.meduza.android.widget.WidgetService
io.meduza.android.services.CustomFirebaseMessagingService
io.meduza.android.services.CustomFirebaseTokenService
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.AnalyticsJobService
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
com.twitter.sdk.android.tweetcomposer.TweetUploadService
com.yandex.metrica.MetricaService
com.yandex.metrica.ConfigurationService
com.yandex.metrica.ConfigurationJobService
Receivers
io.meduza.android.receivers.PlayerNotificationReceiver
io.meduza.android.widget.WidgetProviderReceiver
com.google.android.gms.analytics.CampaignTrackingReceiver
com.google.android.gms.analytics.AnalyticsReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.yandex.metrica.MetricaEventHandler
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
io.meduza.android.services.CustomFirebaseTokenService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.yandex.metrica.ConfigurationService
actions: com.yandex.metrica.configuration.ACTION_START
com.yandex.metrica.MetricaService
actions: com.yandex.metrica.IMetricaService
categories: android.intent.category.DEFAULT
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
io.meduza.android.services.ListenerFromWearService
actions: com.google.android.gms.wearable.MESSAGE_RECEIVED, com.google.android.gms.wearable.DATA_CHANGED
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
io.meduza.android.services.CustomFirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
Activity-related intent filters
io.meduza.android.activities.NewsSingleListActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
io.meduza.android.activities.NewsActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
io.meduza.android.activities.DeepLinkingActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
io.meduza.android.activities.TvActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
io.meduza.android.receivers.PlayerNotificationReceiver
actions: actionNotificationPause, actionNotificationResume, actionNotificationClose
io.meduza.android.widget.WidgetProviderReceiver
actions: android.appwidget.action.APPWIDGET_UPDATE
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: io.meduza.android
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.yandex.metrica.MetricaEventHandler
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1333
Uncompressed size
37295458
Highest datetime
2018-08-02 07:40:08
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
598
xml
332
otf
9
so
9
dex
2
csv
1
gz
1
txt
1
Contained files by type
PNG
598
XML
332
unknown
59
ELF
9
DEX
2
File identification
MD5 1087f357977ea8908465c019ea47a9f5
SHA1 642d057a0e439c585cbac01507e0d6ce22d316dc
SHA256 28a62db786b51dea3af2875e323d25eff4767e9d31b0a9e27919d7af8c4f4a40
ssdeep
393216:T3jvWnZdXVhA2ian6jLnZxp/KpXIv5dEtxSeHmMkMKbiS:u3FziCuLZxpydIpBpiS

File size 17.1 MB ( 17960391 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (58.6%)
Java Archive (16.2%)
Sweet Home 3D design (generic) (11.7%)
Mozilla Archive Format (gen) (7.8%)
ZIP compressed archive (4.4%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-09-05 08:14:12 UTC ( 8 months, 2 weeks ago )
Last submission 2019-03-03 20:25:14 UTC ( 2 months, 3 weeks ago )
File names 985595_a31fed_io.meduza.android_6.3.8_638.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!