× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 367c024f037752459f9af7f06b56b41bf6568ae084f07b2b3479ef7cbcc87b9c
File name: com.dotgears.flappybird.apk
Detection ratio: 21 / 49
Analysis date: 2014-02-12 21:55:31 UTC ( 3 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware Android.Riskware.SMSReg.BW 20140212
AntiVir SPR/ANDR.SMSreg.CX.Gen 20140212
Baidu-International Trojan.AndroidOS.SMS.At 20140212
BitDefender Android.Riskware.SMSReg.BW 20140212
Comodo TrojWare.JS.Iframe.AHD 20140212
DrWeb Android.SmsSend.976.origin 20140212
Emsisoft Android.Riskware.SMSReg.BW (B) 20140212
ESET-NOD32 a variant of Android/SMSreg.EC 20140212
F-Secure Android.Riskware.SMSReg.BW 20140212
Fortinet Android/VietSms.T 20140212
GData Android.Riskware.SMSReg.BW 20140212
Ikarus AndroidOS.SMSreg 20140212
Kaspersky HEUR:Trojan-SMS.AndroidOS.Agent.eq 20140212
Kingsoft Android.Troj.at_Hdcsms.a.(kcloud) 20140212
McAfee Artemis!7E3B88664F6B 20140212
McAfee-GW-Edition Artemis!7E3B88664F6B 20140212
eScan Android.Riskware.SMSReg.BW 20140212
Sophos Andr/VietSms-T 20140212
Symantec Trojan.Gen.2 20140212
TrendMicro-HouseCall TROJ_GEN.F47V0209 20140212
VIPRE Trojan.AndroidOS.Generic.A 20140212
Yandex 20140212
AhnLab-V3 20140212
Avast 20140212
AVG 20140212
Bkav 20140212
ByteHero 20140212
CAT-QuickHeal 20140212
ClamAV 20140212
CMC 20140211
Commtouch 20140212
F-Prot 20140211
Jiangmin 20140212
K7AntiVirus 20140212
K7GW 20140212
Malwarebytes 20140212
Microsoft 20140212
NANO-Antivirus 20140212
Norman 20140212
nProtect 20140212
Panda 20140212
Qihoo-360 20140212
Rising 20140212
SUPERAntiSpyware 20140212
TheHacker 20140212
TotalDefense 20140212
TrendMicro 20140212
VBA32 20140212
ViRobot 20140212
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.dotgears.flappybird. The internal version number of the application is 4. The displayed version string of the application is 1.3. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.INTERNET (full Internet access)
android.permission.READ_SMS (read SMS or MMS)
Activities
com.dotgears.flappy.TestActivity
com.dotgears.GameActivity
com.google.ads.AdActivity
Receivers
hdc.sms.active.SmsReceiver
Activity-related intent filters
com.dotgears.flappy.TestActivity
actions: android.intent.action.MAIN
Receiver-related intent filters
hdc.sms.active.SmsReceiver
actions: android.provider.Telephony.SMS_RECEIVED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
103
Uncompressed size
2205438
Highest datetime
2014-02-06 09:07:42
Lowest datetime
2014-02-06 00:38:52
Contained files by extension
png
80
xml
8
ogg
5
so
3
dex
1
MF
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
80
XML
8
unknown
6
OGG
5
ELF
3
DEX
1
Compressed bundles
File identification
MD5 7e3b88664f6be420311587e82b08fc77
SHA1 54ae26993550abfa0f7d57614c43f0c6987aa5eb
SHA256 367c024f037752459f9af7f06b56b41bf6568ae084f07b2b3479ef7cbcc87b9c
ssdeep
24576:Ic11DinZcbshv7eYszTRxJ4u59QCji1MSTRt:Ic3iZWs57e5/va69Vu1FTRt

File size 940.0 KB ( 962562 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2014-02-09 09:42:53 UTC ( 3 years, 4 months ago )
Last submission 2016-07-07 13:51:47 UTC ( 11 months, 3 weeks ago )
File names com.dotgears.flappybird.apk
com.dotgears.flappybird
com.dotgears.flappybird.apk
com.dotgears.flappybird.apk
com.dotgears.flappybird.apk.zip
file-7230187_apk
367c024f037752459f9af7f06b56b41bf6568ae084f07b2b3479ef7cbcc87b9c
com.dotgears.flappybird.apk
foGbBka9N4XLVNopDKxy20160707-28462-k0h7qu
7e3b88664f6be420311587e82b08fc77.apk
Не подтвержден 720998.crdownload
367c024f037752459f9af7f06b56b41bf6568ae084f07b2b3479ef7cbcc87b9c.log
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.INTERNET:com.dotgears.flappybird
android.permission.ACCESS_NETWORK_STATE:com.dotgears.flappybird
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
Opened files
APP_ASSETS/config.txt
/data/data/com.dotgears.flappybird/cache/admob
/data/data/com.dotgears.flappybird/databases/admob
Accessed files
/data/data/com.dotgears.flappybird/app_mydata/info.txt
Contacted URLs
http://www.wap4android.info/Host.php/info=c21zIUAjJCU=
696E666F3D6332317A4955416A4A4355253344
http://www.wap4android.info/Admin.php/info=c21zIUAjJCU=
696E666F3D6332317A4955416A4A4355253344
Accessed URIs
content://com.google.plus.platform/token
market://details?id=com.google.ads
geo:0,0?q=donuts
market://search?q=pname:com.google