× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 31507a0add81afd9871f733ac67c42974684edc0d7ff078a467a992c40039a04
File name: com.madfingergames.deadtrigger2_0.09.8_9801.apk
Detection ratio: 0 / 56
Analysis date: 2016-02-21 22:34:28 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160222
AegisLab 20160222
Yandex 20160221
AhnLab-V3 20160221
Alibaba 20160222
ALYac 20160222
Antiy-AVL 20160221
Arcabit 20160222
Avast 20160222
AVG 20160222
Avira (no cloud) 20160221
AVware 20160222
Baidu-International 20160221
BitDefender 20160222
Bkav 20160220
ByteHero 20160222
CAT-QuickHeal 20160222
ClamAV 20160222
CMC 20160219
Comodo 20160221
Cyren 20160222
DrWeb 20160222
Emsisoft 20160222
ESET-NOD32 20160221
F-Prot 20160221
F-Secure 20160222
Fortinet 20160222
GData 20160222
Ikarus 20160222
Jiangmin 20160222
K7AntiVirus 20160221
K7GW 20160222
Kaspersky 20160222
Malwarebytes 20160221
McAfee 20160222
McAfee-GW-Edition 20160222
Microsoft 20160222
eScan 20160222
NANO-Antivirus 20160222
nProtect 20160219
Panda 20160221
Qihoo-360 20160222
Rising 20160221
Sophos AV 20160222
SUPERAntiSpyware 20160221
Symantec 20160221
Tencent 20160222
TheHacker 20160217
TotalDefense 20160221
TrendMicro 20160222
TrendMicro-HouseCall 20160222
VBA32 20160220
VIPRE 20160222
ViRobot 20160222
Zillya 20160219
Zoner 20160222
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.madfingergames.deadtrigger2. The internal version number of the application is 9801. The displayed version string of the application is 0.09.8. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.BROADCAST_STICKY (send sticky broadcast)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.madfingergames.deadtrigger2.permission.C2D_MESSAGE (C2DM permission.)
android.permission.GET_ACCOUNTS (discover known accounts)
com.sec.android.iap.permission.BILLING (Unknown permission from android reference)
Activities
com.madfingergames.unity3d.player.MFUnityPlayerNativeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
com.madfingergames.billing.googleplay.v3.BillingProxyActivity
com.madfingergames.billing.samsungapps.BillingProxyActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.facebook.unity.FBUnityDialogsActivity
com.prime31.EtceteraProxyActivity
com.prime31.WebViewActivity
com.prime31.P31VideoPlayerActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.unity3d.player.VideoPlayer
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
com.arellomobile.android.push.PushWebview
com.arellomobile.android.push.MessageActivity
com.arellomobile.android.push.PushHandlerActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.google.ads.AdActivity
com.amazon.ags.html5.overlay.GameCircleUserInterface
com.amazon.ags.html5.overlay.GameCircleAlertUserInterface
com.amazon.identity.auth.device.authorization.AuthorizationActivity
com.everyplay.Everyplay.view.EveryplaySocialActivity
com.everyplay.Everyplay.view.EveryplayTextInputActivity
com.everyplay.Everyplay.view.videoplayer.EveryplayVideoPlayerActivity
com.everyplay.Everyplay.view.videoplayer.EveryplayVideoEditorActivity
com.everyplay.Everyplay.view.EveryplaySharingModalActivity
com.everyplay.Everyplay.view.browser.EveryplayBrowserActivity
com.everyplay.Everyplay.view.auth.EveryplayAuthActivity
com.everyplay.Everyplay.view.auth.EveryplayAddConnectionActivity
com.everyplay.Everyplay.communication.socialnetworks.EveryplayFacebook
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.unity3d.plugin.downloader.UnityDownloaderService
com.arellomobile.android.push.PushGCMIntentService
com.everyplay.Everyplay.communication.upload.EveryplayUploadService
Receivers
com.unity3d.plugin.downloader.UnityAlarmReceiver
com.prime31.AlarmManagerReceiver
com.amazon.inapp.purchasing.ResponseReceiver
com.arellomobile.android.push.AlarmReceiver
com.google.android.gcm.GCMBroadcastReceiver
com.amazon.identity.auth.device.authorization.PackageIntentReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.madfingergames.unity3d.player.TrackingReciever
Activity-related intent filters
com.madfingergames.unity3d.player.MFUnityPlayerNativeActivity
actions: android.intent.action.MAIN, com.madfingergames.deadtrigger2.MESSAGE, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.amazon.identity.auth.device.authorization.AuthorizationActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.madfingergames.deadtrigger2
com.amazon.identity.auth.device.authorization.PackageIntentReceiver
actions: android.intent.action.PACKAGE_INSTALL, android.intent.action.PACKAGE_ADDED
com.amazon.inapp.purchasing.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
com.madfingergames.unity3d.player.TrackingReciever
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
402
Uncompressed size
38620395
Highest datetime
2015-05-29 19:59:56
Lowest datetime
2014-08-08 01:43:38
Contained files by extension
png
251
xml
107
dll
18
so
7
js
2
dex
1
MF
1
zip
1
RSA
1
wav
1
txt
1
SF
1
Contained files by type
PNG
251
XML
107
Portable Executable
18
unknown
17
ELF
7
DEX
1
ZIP
1
File identification
MD5 e2a93e87877f9bcbf386ff62be89f2c5
SHA1 944936706ad216a61efc3c90ae9bd392b0b81510
SHA256 31507a0add81afd9871f733ac67c42974684edc0d7ff078a467a992c40039a04
ssdeep
393216:QNICaauMLo+MNG/uIhSdCLoclawdEcixVxMBwjDh:QdZLuGunCUclpfSh

File size 15.2 MB ( 15945066 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-06-05 18:44:32 UTC ( 3 years, 9 months ago )
Last submission 2016-10-04 02:22:55 UTC ( 2 years, 5 months ago )
File names com.madfingergames.deadtrigger2_0.09.8_9801.apk
c571dd289b39407912716b7d3fcd3396dcaa4b0e246a72f1643f107de6b886af0dacb19fb38598ef476870464f5ed964fc39a0430d6924bd565c6d047ecf7e4a
DEAD TRIGGER 2 v0.09.8.apk
dead-trigger-2.apk
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.madfingergames.deadtrigger2-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.madfingergames.deadtrigger2