× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3cc946d0585caf4e0d4c8e84d2240d197f0e3cce31da3b14d70768270dc53e99
File name: com.fingersoft.failhard.apk
Detection ratio: 0 / 57
Analysis date: 2016-05-14 14:53:57 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware 20160514
AegisLab 20160514
AhnLab-V3 20160514
Alibaba 20160513
ALYac 20160514
Antiy-AVL 20160514
Arcabit 20160514
Avast 20160514
AVG 20160514
Avira (no cloud) 20160514
AVware 20160511
Baidu 20160513
Baidu-International 20160514
BitDefender 20160514
Bkav 20160514
CAT-QuickHeal 20160514
ClamAV 20160514
CMC 20160510
Comodo 20160514
Cyren 20160514
DrWeb 20160514
Emsisoft 20160514
ESET-NOD32 20160514
F-Prot 20160514
F-Secure 20160514
Fortinet 20160514
GData 20160514
Ikarus 20160514
Jiangmin 20160514
K7AntiVirus 20160514
K7GW 20160514
Kaspersky 20160514
Kingsoft 20160514
Malwarebytes 20160514
McAfee 20160514
McAfee-GW-Edition 20160514
Microsoft 20160514
eScan 20160514
NANO-Antivirus 20160514
nProtect 20160513
Panda 20160514
Qihoo-360 20160514
Rising 20160514
Sophos AV 20160514
SUPERAntiSpyware 20160514
Symantec 20160514
Tencent 20160514
TheHacker 20160513
TotalDefense 20160514
TrendMicro 20160514
TrendMicro-HouseCall 20160514
VBA32 20160513
VIPRE 20160514
ViRobot 20160514
Yandex 20160513
Zillya 20160514
Zoner 20160514
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.fingersoft.failhard. The internal version number of the application is 31. The displayed version string of the application is 1.0.16. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.fingersoft.failhard.GA_Android
com.prime31.GoogleIABProxyActivity
com.supersonicads.sdk.android.WebViewActivity
com.inmobi.androidsdk.IMBrowserActivity
com.google.android.gms.ads.AdActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.everyplay.Everyplay.view.EveryplaySocialActivity
com.everyplay.Everyplay.view.EveryplayTextInputActivity
com.everyplay.Everyplay.view.videoplayer.EveryplayVideoPlayerActivity
com.everyplay.Everyplay.view.videoplayer.EveryplayVideoEditorActivity
com.everyplay.Everyplay.view.EveryplaySharingModalActivity
com.everyplay.Everyplay.view.browser.EveryplayBrowserActivity
com.everyplay.Everyplay.view.auth.EveryplayAuthActivity
com.everyplay.Everyplay.view.auth.EveryplayAddConnectionActivity
com.everyplay.Everyplay.communication.socialnetworks.EveryplayFacebook
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
Services
com.everyplay.Everyplay.communication.upload.EveryplayUploadService
com.unity3d.plugin.downloader.UnityDownloaderService
Receivers
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
com.amazon.inapp.purchasing.ResponseReceiver
com.unity3d.plugin.downloader.UnityAlarmReceiver
Activity-related intent filters
com.fingersoft.failhard.GA_Android
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.inmobi.commons.analytics.androidsdk.IMAdTrackerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.inapp.purchasing.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
270
Uncompressed size
46813284
Highest datetime
2015-07-06 09:54:42
Lowest datetime
2015-06-08 13:35:52
Contained files by extension
png
154
xml
81
dll
14
so
7
dex
1
MF
1
RSA
1
js
1
ini
1
SF
1
Contained files by type
PNG
154
XML
81
Portable Executable
14
unknown
12
ELF
7
DEX
1
HTML
1
File identification
MD5 e544ee4444b59ef6df045ff15692b226
SHA1 ddc59fd280af21b61ed9a38fb4d71edaf25cc34c
SHA256 3cc946d0585caf4e0d4c8e84d2240d197f0e3cce31da3b14d70768270dc53e99
ssdeep
393216:W+bFEtzL6ogu6edoi6qaIVJv9nehluGiRPnb2jQb:Pb2hL5gWGi6xkvItiJb2sb

File size 16.7 MB ( 17515576 bytes )
File type Android
Magic literal
Zip archive data, at least v1.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-07-07 16:59:50 UTC ( 3 years, 10 months ago )
Last submission 2017-05-22 04:24:05 UTC ( 1 year, 12 months ago )
File names fail-hard-1.0.16.apk
3cc946d0585caf4e0d4c8e84d2240d197f0e3cce31da3b14d70768270dc53e99
6201fb9ef46a182e26550885145bf724e8c41859c378f66b524eedd1b7ff0aff0d40080f34a915aa49afa59f9386d452dc7d41212761411dda54593f69f72dad
faihardpjb_XP85.apk
com.fingersoft.failhard.apk
fail-hard.apk
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!