× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 30be84d772a6b0c54ce886a43c5af8bfdb2476a98867da3252b4726ec2215e29
File name: 30be84d772a6b0c54ce886a43c5af8bfdb2476a98867da3252b4726ec2215e29
Detection ratio: 2 / 61
Analysis date: 2018-02-05 04:50:44 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
Antiy-AVL Trojan/Android.TSGeneric 20180205
TrendMicro-HouseCall Suspicious_GEN.F47V0109 20180205
Ad-Aware 20180205
AegisLab 20180205
AhnLab-V3 20180204
Alibaba 20180205
ALYac 20180205
Arcabit 20180205
Avast 20180205
Avast-Mobile 20180204
AVG 20180205
Avira (no cloud) 20180204
AVware 20180205
Baidu 20180202
BitDefender 20180205
Bkav 20180202
CAT-QuickHeal 20180204
ClamAV 20180205
CMC 20180204
Comodo 20180205
CrowdStrike Falcon (ML) 20170201
Cybereason 20171103
Cylance 20180205
Cyren 20180205
DrWeb 20180205
eGambit 20180205
Emsisoft 20180205
Endgame 20171130
ESET-NOD32 20180205
F-Prot 20180205
Fortinet 20180205
GData 20180205
Ikarus 20180204
Sophos ML 20180121
Jiangmin 20180205
K7AntiVirus 20180205
K7GW 20180204
Kaspersky 20180205
Kingsoft 20180205
Malwarebytes 20180205
MAX 20180205
McAfee 20180205
McAfee-GW-Edition 20180205
Microsoft 20180205
eScan 20180205
NANO-Antivirus 20180204
nProtect 20180205
Palo Alto Networks (Known Signatures) 20180205
Panda 20180204
Qihoo-360 20180205
Rising 20180205
SentinelOne (Static ML) 20180115
Sophos AV 20180205
SUPERAntiSpyware 20180204
Symantec 20180204
Symantec Mobile Insight 20180202
Tencent 20180205
TheHacker 20180202
TotalDefense 20180204
TrendMicro 20180205
Trustlook 20180205
VBA32 20180202
VIPRE 20180205
ViRobot 20180205
Webroot 20180205
Yandex 20180204
Zillya 20180202
ZoneAlarm by Check Point 20180205
Zoner 20180205
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.glu.t5. The internal version number of the application is 1020. The displayed version string of the application is 1.0.2. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.facebook.ads.InterstitialAdActivity
com.glu.plugins.aads.gifting.GiftingActivity
com.playhaven.android.view.FullScreen
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.trialpay.android.OfferwallActivity
com.glu.plugins.aads.video.VideoAdsActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.flurry.android.FlurryFullscreenTakeoverActivity
com.google.android.gms.ads.AdActivity
com.inmobi.androidsdk.IMBrowserActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.helpshift.HSConversation
com.helpshift.HSQuestionsList
com.helpshift.HSQuestion
com.helpshift.HSSection
com.helpshift.HSFaqs
com.helpshift.HSReview
com.helpshift.ScreenshotPreviewActivity
com.helpshift.SearchResultActivity
com.glu.plugins.ajavatools.AJTInternet$WebActivity
com.facebook.LoginActivity
com.google.android.vending.expansion.downloader_impl.DownloaderActivity
com.glu.plugins.aunityinstaller.UnityLauncherActivity
com.unity3d.player.VideoPlayer
Services
com.helpshift.HSService
com.helpshift.HSRetryService
com.glu.plugins.anotificationmanager.DownloaderService
com.glu.plugins.aunityinstaller.assetbundles.UnpackerService
com.google.android.vending.expansion.downloader_impl.GDownloaderService
Receivers
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
com.glu.plugins.anotificationmanager.NotificationReceiver
com.google.android.vending.expansion.downloader_impl.AlarmReceiver
com.glu.plugins.aunityinstaller.GluInstallReferrerBroadcastReceiver
Activity-related intent filters
com.google.android.vending.expansion.downloader_impl.DownloaderActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.playhaven.android.view.FullScreen
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE, com.inmobi.share.id
com.glu.plugins.aunityinstaller.GluInstallReferrerBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.glu.plugins.anotificationmanager.NotificationReceiver
actions: android.intent.action.BOOT_COMPLETED, com.glu.intent.action.SCHEDULE_NOTIFICATION, com.glu.intent.action.DISPLAY_NOTIFICATION
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
465
Uncompressed size
28010778
Highest datetime
2015-06-02 11:49:48
Lowest datetime
2015-03-24 04:41:18
Contained files by extension
png
353
xml
94
so
5
dex
3
MF
1
3gp
1
RSA
1
js
1
ks
1
dat
1
SF
1
Contained files by type
PNG
353
XML
94
unknown
10
ELF
5
DEX
3
Compressed bundles
File identification
MD5 f7f19ba18afd4f63e48c39d613c9985b
SHA1 15c31e927b94dfd7117e7250ff39b2ad49a3cf4d
SHA256 30be84d772a6b0c54ce886a43c5af8bfdb2476a98867da3252b4726ec2215e29
ssdeep
196608:I3dMVcYxChdxs+rUGXi6BMrUFWjEouClJp4X4s2sm35RwkOiwv9p+O4ehZiHigSK:WMMD9UGXi4YUXClJOX45smWrp+7ehZiF

File size 11.8 MB ( 12383404 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android software-collection dyn-calls contains-elf

VirusTotal metadata
First submission 2015-06-03 02:39:35 UTC ( 3 years, 11 months ago )
Last submission 2019-04-03 02:18:16 UTC ( 1 month, 2 weeks ago )
File names 345960_41d03b_com.glu.t5-1020.apk
f7f19ba18afd4f63e48c39d613c9985b.tmp.3516
TERMINATOR-GENISYS-REVOLUTION.apk
f7f19ba18afd4f63e48c39d613c9985b.tmp.17189
Terminator v1.0.2.apk
terminator-genisys-revolution-1.0.2.apk
Terminator genisys Revolution v1.0.2.apk
1433337796_com.glu.t5_1.0.2.apk
a71adf5ea98c84597935605e29202a31c56a816e9185a783755ddabfcae3843cdfb2a585db3e13a8591e0533fce9a100e8dc511722a3e65e397892480dddb4bd
Revolution_xt70.apk
package.apk
f7f19ba18afd4f63e48c39d613c9985b.tmp.9197
1433532607_com.glu.t5.apk
1436965894_com.glu.t5-1020.apk
1_terminator_genisys_revolution-www.1mobile2u.com.apk
filename
1433337796_com.glu.t5_1.0.2.apk
6091cfaca0764a608389546257c7d2ac
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/app/com.glu.t5-1.apk
/data/data/com.glu.t5/code_cache/secondary-dexes
/data/data/com.glu.t5/code_cache/secondary-dexes/com.glu.t5-1.apk.classes-13156105.zip
/data/data/com.glu.t5/code_cache/secondary-dexes/com.glu.t5-1.apk.classes1240596552.zip
/data/data/com.glu.t5/files/secondary-dexes
/data/data/com.glu.t5/code_cache/secondary-dexes/com.glu.t5-1.apk.classes2.zip
/data/data/com.glu.t5/code_cache/secondary-dexes/com.glu.t5-1.apk.classes3.zip
/mnt/sdcard
Accessed files
/data/data/com.glu.t5/files
/mnt/sdcard/.gludebug
/mnt/sdcard/Android/obb/com.glu.t5
Dynamically called methods
android.content.SharedPreferences$Editor.apply