× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 295e46358192397a0d39def146eb3a9c5c2aba09ee8afab425aa96a872cbc025
File name: 1437994603_com.hammerhead.undergroundcrew.apk
Detection ratio: 0 / 56
Analysis date: 2016-11-14 00:37:27 UTC ( 2 years, 6 months ago )
Antivirus Result Update
Ad-Aware 20161114
AegisLab 20161113
AhnLab-V3 20161113
Alibaba 20161110
ALYac 20161114
Antiy-AVL 20161113
Arcabit 20161114
Avast 20161114
AVG 20161113
Avira (no cloud) 20161113
AVware 20161114
Baidu 20161111
BitDefender 20161114
Bkav 20161112
CAT-QuickHeal 20161112
ClamAV 20161114
CMC 20161113
Comodo 20161113
CrowdStrike Falcon (ML) 20161024
Cyren 20161114
DrWeb 20161114
Emsisoft 20161114
ESET-NOD32 20161113
F-Prot 20161114
F-Secure 20161113
Fortinet 20161114
GData 20161114
Ikarus 20161113
Sophos ML 20161018
Jiangmin 20161113
K7AntiVirus 20161113
K7GW 20161114
Kaspersky 20161113
Kingsoft 20161114
Malwarebytes 20161114
McAfee 20161114
McAfee-GW-Edition 20161113
Microsoft 20161113
eScan 20161114
NANO-Antivirus 20161114
nProtect 20161113
Panda 20161113
Qihoo-360 20161114
Rising 20161114
Sophos AV 20161113
SUPERAntiSpyware 20161113
Symantec 20161114
Tencent 20161114
TheHacker 20161111
TotalDefense 20161113
TrendMicro 20161114
TrendMicro-HouseCall 20161114
VBA32 20161111
VIPRE 20161113
ViRobot 20161113
Yandex 20161113
Zillya 20161111
Zoner 20161113
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.hammerhead.undergroundcrew. The internal version number of the application is 2. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.hammerhead.undergroundcrew.permission.C2D_MESSAGE (C2DM permission.)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.androidnative.billing.core.AN_BillingProxyActivity
com.androidnative.gms.core.GooglePlaySupportActivity
com.androidnative.AndroidNativeProxy
com.unity3d.player.UnityPlayerActivity
com.google.android.gms.ads.AdActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.facebook.unity.FBUnityDialogsActivity
com.startapp.android.publish.list3d.List3DActivity
com.startapp.android.publish.AppWallActivity
Services
com.androidnative.gcm.GcmIntentService
com.parse.ParsePushService
Receivers
com.androidnative.features.notifications.LocalNotificationReceiver
com.androidnative.gcm.GcmBroadcastReceiver
com.parse.ParsePushBroadcastReceiver
Providers
android.support.v4.content.FileProvider
Activity-related intent filters
com.androidnative.AndroidNativeProxy
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.androidnative.gcm.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.hammerhead.undergroundcrew
com.parse.ParsePushBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.hammerhead.undergroundcrew
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
304
Uncompressed size
123670572
Highest datetime
2015-07-13 19:03:18
Lowest datetime
2015-01-26 22:06:14
Contained files by extension
png
79
xml
28
dll
15
zip
7
so
6
dex
1
MF
1
RSA
1
ogg
1
SF
1
Contained files by type
unknown
167
PNG
79
XML
28
Portable Executable
15
ZIP
7
ELF
6
DEX
1
OGG
1
File identification
MD5 d36f34377460b3d2e4a569b6b9725ca3
SHA1 86fdd48c07b7a9a94b62df519eb324a7f978409f
SHA256 295e46358192397a0d39def146eb3a9c5c2aba09ee8afab425aa96a872cbc025
ssdeep
786432:NsW3+156V2mH71SF9gLASyZ6m72dGBjGU6Czn/joSSUS3Ix/7AE+b0AOHIc4Ko:Nt+1+TZi6LAzsY29UH/EVUeAzTroc6

File size 38.3 MB ( 40165760 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-07-19 04:59:18 UTC ( 3 years, 10 months ago )
Last submission 2016-06-01 06:52:30 UTC ( 2 years, 11 months ago )
File names underground-crew-v1-1.apk
1437994603_com.hammerhead.undergroundcrew.apk
underground-crew-1.1.apk
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.hammerhead.undergroundcrew/cache
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.hammerhead.undergroundcrew-1.apk/assets/bin/Data/settings.xml