× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 2a84e8ce6a3cb6ed944e5eab37b00c7e685476ff3ddb41b114a050dcbb151768
File name: [androidapplications.ru]net.playtouch.stickmanfighterepicbattle2.apk
Detection ratio: 0 / 61
Analysis date: 2018-03-07 07:59:02 UTC ( 10 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware 20180307
AegisLab 20180307
AhnLab-V3 20180307
Alibaba 20180307
ALYac 20180307
Antiy-AVL 20180307
Arcabit 20180306
Avast 20180307
Avast-Mobile 20180306
AVG 20180307
Avira (no cloud) 20180307
AVware 20180307
Baidu 20180305
BitDefender 20180307
Bkav 20180306
CAT-QuickHeal 20180307
ClamAV 20180307
CMC 20180307
Comodo 20180307
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180307
Cyren 20180307
DrWeb 20180307
eGambit 20180307
Emsisoft 20180307
Endgame 20180303
ESET-NOD32 20180307
F-Prot 20180307
F-Secure 20180307
Fortinet 20180307
GData 20180307
Ikarus 20180306
Sophos ML 20180121
Jiangmin 20180307
K7AntiVirus 20180307
K7GW 20180307
Kaspersky 20180307
Kingsoft 20180307
Malwarebytes 20180307
MAX 20180307
McAfee 20180307
McAfee-GW-Edition 20180307
Microsoft 20180307
eScan 20180307
NANO-Antivirus 20180307
nProtect 20180307
Palo Alto Networks (Known Signatures) 20180307
Panda 20180306
Qihoo-360 20180307
Rising 20180307
SentinelOne (Static ML) 20180225
Sophos AV 20180307
SUPERAntiSpyware 20180307
Symantec 20180307
Symantec Mobile Insight 20180306
Tencent 20180307
TheHacker 20180307
TrendMicro-HouseCall 20180307
Trustlook 20180307
VBA32 20180306
VIPRE 20180307
ViRobot 20180307
Webroot 20180307
WhiteArmor 20180223
Yandex 20180307
Zillya 20180306
ZoneAlarm by Check Point 20180307
Zoner 20180307
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.playtouch.stickmanfighterepicbattle2. The internal version number of the application is 1100002. The displayed version string of the application is 11. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
net.playtouch.stickmanfighterepicbattle2.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
net.playtouch.stickmanfighterepicbattle2.MainActivity
com.google.android.gms.ads.AdActivity
com.adincube.sdk.AdinCubeActivity
com.adincube.sdk.mediation.chartboost.ChartboostActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.vungle.publisher.FlexViewAdActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.measurement.AppMeasurementService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
net.playtouch.stickmanfighterepicbattle2.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: net.playtouch.stickmanfighterepicbattle2
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
560
Uncompressed size
66581041
Highest datetime
2017-10-25 12:05:50
Lowest datetime
1980-01-01 00:00:00
Contained files by extension
png
346
ogg
98
js
49
xml
45
so
2
pak
2
dex
1
MF
1
RSA
1
jpg
1
dat
1
SF
1
wav
1
csv
1
Contained files by type
PNG
346
OGG
98
unknown
65
XML
44
ELF
2
DEX
1
JavaScript
1
JPG
1
JSON
1
HTML
1
File identification
MD5 e2c02f11b94c8c015fa051b797620ea5
SHA1 caae07b9af9f7714251fb4b2bd65b03f07c01391
SHA256 2a84e8ce6a3cb6ed944e5eab37b00c7e685476ff3ddb41b114a050dcbb151768
ssdeep
786432:6wI+xpDfCmGHLQ/78gJ9lrZw30pFO26uSuBGmrnLusWX6Ro3azxhfG51:6wdfJMuQgPldwcJaKGCnaH+UaFhfG51

File size 35.3 MB ( 36996789 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (50.2%)
Java Archive (13.8%)
Opera Widget (13.3%)
VYM Mind Map (11.9%)
Mozilla Archive Format (gen) (6.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-03-07 07:59:02 UTC ( 10 months, 2 weeks ago )
Last submission 2018-03-07 07:59:02 UTC ( 10 months, 2 weeks ago )
File names [androidapplications.ru]net.playtouch.stickmanfighterepicbattle2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!