× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3491fa7ef62deffcaa4a0a771ee13d2e3a9043b206f5214cc1e674d38be8284a
File name: 586.apk
Detection ratio: 0 / 59
Analysis date: 2018-11-21 21:17:16 UTC ( 3 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181121
AegisLab 20181121
AhnLab-V3 20181121
Alibaba 20180921
ALYac 20181121
Antiy-AVL 20181121
Arcabit 20181121
Avast 20181121
Avast-Mobile 20181121
AVG 20181121
Avira (no cloud) 20181121
Babable 20180918
Baidu 20181121
BitDefender 20181121
Bkav 20181121
CAT-QuickHeal 20181121
ClamAV 20181121
CMC 20181121
Comodo 20181121
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181121
Cyren 20181121
DrWeb 20181121
eGambit 20181121
Emsisoft 20181121
Endgame 20181108
ESET-NOD32 20181121
F-Prot 20181121
F-Secure 20181121
Fortinet 20181121
GData 20181121
Ikarus 20181121
Sophos ML 20181108
Jiangmin 20181121
K7AntiVirus 20181121
K7GW 20181121
Kaspersky 20181121
Kingsoft 20181121
Malwarebytes 20181121
MAX 20181121
McAfee 20181121
McAfee-GW-Edition 20181121
Microsoft 20181121
eScan 20181121
NANO-Antivirus 20181121
Palo Alto Networks (Known Signatures) 20181121
Panda 20181121
Qihoo-360 20181121
Rising 20181121
SentinelOne (Static ML) 20181011
Sophos AV 20181121
SUPERAntiSpyware 20181121
Symantec 20181121
Symantec Mobile Insight 20181121
TACHYON 20181121
Tencent 20181121
TheHacker 20181118
TotalDefense 20181121
TrendMicro 20181121
TrendMicro-HouseCall 20181121
Trustlook 20181121
VBA32 20181121
VIPRE 20181121
ViRobot 20181121
Webroot 20181121
Yandex 20181119
Zillya 20181121
ZoneAlarm by Check Point 20181121
Zoner 20181121
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.escape.room.door.word.prison.puzzle.adventure. The internal version number of the application is 115. The displayed version string of the application is 1.1.5. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.escape.room.door.word.prison.puzzle.adventure.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.appinvite.PreviewActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabMainActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.ads.internal.ipc.RemoteANActivity
com.android.billingclient.api.ProxyBillingActivity
com.facebook.ads.InterstitialAdActivity
com.fw.basemodules.animal.ButterflyNoPadding
com.fw.basemodules.animal.Swallow
com.fw.basemodules.animal.SwallowLargeCard
com.fw.basemodules.animal.SwallowLargeCardOrange
com.fw.basemodules.animal.SwallowLargeCardGreen
com.fw.basemodules.animal.BeeAC
com.fw.basemodules.animal.BeeAP
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.fw.basemodules.ad.mopub.base.common.MoPubBrowser
com.fw.basemodules.ad.mopub.base.mobileads.MraidVideoPlayerActivity
com.fw.basemodules.animal.BeeTF
com.fw.basemodules.animal.BeeTFVD
com.fw.basemodules.wp.INAV
com.fw.basemodules.wp.UFS
com.fw.basemodules.wp.nfp.MIAA
com.fw.basemodules.wp.nfp.FNAV
com.fw.basemodules.animal.LionIRD
com.fw.basemodules.login.activity.LoginActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
Services
com.escape.room.door.word.prison.puzzle.adventure.service.SyncService
com.escape.room.door.word.prison.puzzle.adventure.service.SyncServiceJbS
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.facebook.ads.internal.ipc.AdsProcessPriorityService
com.facebook.ads.internal.ipc.AdsMessengerService
com.fw.basemodules.ptoes.MgBSS
com.fw.basemodules.ptoes.MgBSSJbS
com.fw.basemodules.ptoes.LiSS
com.fw.basemodules.ptoes.LiSSJbS
com.fw.basemodules.ptoes.NaLs
com.fw.basemodules.ptoes.NaLsJbS
com.fw.basemodules.extension.np.bubbleview.view.BubblesService
com.fw.basemodules.ad.tp.MPRS
com.fw.basemodules.ad.tp.MPRSJbS
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.iid.FirebaseInstanceIdService
com.firebase.jobdispatcher.GooglePlayReceiver
Receivers
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.fw.basemodules.ptoer.CuEBR
com.fw.basemodules.ptoer.HRAR
com.fw.basemodules.ptoer.FeIR
com.fw.basemodules.ptoer.HeULR
com.fw.basemodules.ptoer.CoAIR
com.fw.basemodules.wuu.BeAER
com.fw.basemodules.ptoer.ZnNBR
com.fw.basemodules.ptoer.CoUR
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.facebook.internal.FacebookInitProvider
com.fw.basemodules.wda.WdaProvider
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
com.firebase.jobdispatcher.GooglePlayReceiver
actions: com.google.android.gms.gcm.ACTION_TASK_READY
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.google.android.gms.appinvite.PreviewActivity
actions: com.google.android.gms.appinvite.ACTION_PREVIEW
categories: android.intent.category.DEFAULT
com.facebook.CustomTabActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.fw.basemodules.ptoer.HeULR
actions: android.intent.action.USER_PRESENT
com.fw.basemodules.ptoer.ZnNBR
actions: com.fw.wp.action.ntfclk
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
actions: notification_cancelled
com.fw.basemodules.ptoer.CoUR
actions: android.intent.action.PACKAGE_REMOVED, android.intent.action.PACKAGE_ADDED
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.escape.room.door.word.prison.puzzle.adventure
com.fw.basemodules.ptoer.CoAIR
actions: android.intent.action.PACKAGE_ADDED
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.fw.basemodules.ptoer.FeIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.wuu.BeAER
actions: com.wuu.ae, android.intent.action.ACTION_POWER_CONNECTED, android.intent.action.ACTION_POWER_DISCONNECTED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1879
Uncompressed size
451928822
Highest datetime
2018-11-06 13:41:44
Lowest datetime
2018-11-06 13:41:36
Contained files by extension
xml
77
dll
72
png
36
ttf
8
so
4
dex
2
MF
1
gz
1
RSA
1
SF
1
Contained files by type
unknown
813
XML
73
Portable Executable
72
PNG
36
ELF
4
DEX
2
File identification
MD5 aea3b8d655c8b255649c4a9ebd328ebd
SHA1 bf5790880b7316cd3930bb42f7a2d622d3ed9fec
SHA256 3491fa7ef62deffcaa4a0a771ee13d2e3a9043b206f5214cc1e674d38be8284a
ssdeep
786432:0BvGZMOdsrACg9IETs6M7sBdVO5LJtLXLT6MvNp7EK:0BvGZMMLQEkgnVO5vbXlp7L

File size 34.1 MB ( 35759392 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-11-21 21:17:16 UTC ( 3 months, 4 weeks ago )
Last submission 2018-12-27 10:03:26 UTC ( 2 months, 3 weeks ago )
File names 586.apk
escape-room-mystery-word.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!