× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3de21386006b8bbfe884e9a75402af895b16f26beaf62697ed5a51c92f238ae6
File name: com.neptundigital.colortraps.apk
Detection ratio: 1 / 61
Analysis date: 2017-07-15 04:14:58 UTC ( 1 year, 1 month ago )
Antivirus Result Update
Fortinet Adware/AdColony!Android 20170629
Ad-Aware 20170715
AegisLab 20170715
AhnLab-V3 20170714
ALYac 20170715
Antiy-AVL 20170715
Arcabit 20170715
Avast 20170715
AVG 20170715
Avira (no cloud) 20170714
AVware 20170715
Baidu 20170714
BitDefender 20170715
Bkav 20170714
CAT-QuickHeal 20170714
ClamAV 20170715
CMC 20170714
Comodo 20170715
CrowdStrike Falcon (ML) 20170710
Cylance 20170715
Cyren 20170715
DrWeb 20170715
Emsisoft 20170715
Endgame 20170713
ESET-NOD32 20170715
F-Prot 20170715
F-Secure 20170714
GData 20170715
Ikarus 20170714
Sophos ML 20170607
Jiangmin 20170715
K7AntiVirus 20170714
K7GW 20170715
Kaspersky 20170714
Kingsoft 20170715
Malwarebytes 20170715
MAX 20170715
McAfee 20170715
McAfee-GW-Edition 20170715
Microsoft 20170715
eScan 20170715
NANO-Antivirus 20170715
nProtect 20170715
Palo Alto Networks (Known Signatures) 20170715
Panda 20170714
Qihoo-360 20170715
Rising 20170715
SentinelOne (Static ML) 20170516
Sophos AV 20170715
SUPERAntiSpyware 20170715
Symantec 20170714
Symantec Mobile Insight 20170713
Tencent 20170715
TheHacker 20170712
TotalDefense 20170714
TrendMicro 20170715
TrendMicro-HouseCall 20170715
Trustlook 20170715
VBA32 20170714
VIPRE 20170715
ViRobot 20170715
Webroot 20170715
WhiteArmor 20170713
Yandex 20170714
Zillya 20170714
ZoneAlarm by Check Point 20170715
Zoner 20170715
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.neptundigital.colortraps. The internal version number of the application is 2. The displayed version string of the application is 1.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 16.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.google.ads.AdActivity
com.neptundigital.colortraps.MainActivity
com.google.android.gms.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.hyprmx.android.sdk.activity.HyprMXOfferViewerActivity
com.hyprmx.android.sdk.activity.HyprMXRequiredInformationActivity
com.hyprmx.android.sdk.activity.HyprMXSplashActivity
com.hyprmx.android.sdk.activity.HyprMXOfferListActivity
com.hyprmx.android.sdk.activity.HyprMXNoOffersActivity
com.hyprmx.android.sdk.activity.HyprMXWebTrafficActivity
com.inmobi.rendering.InMobiAdActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.heyzap.sdk.ads.MediationTestActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.apptracker.android.module.AppModuleActivity
Services
com.hyprmx.android.sdk.service.ApplicationInstallService
Receivers
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
com.heyzap.sdk.ads.PackageAddedReceiver
Activity-related intent filters
com.neptundigital.colortraps.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, tv.ouya.intent.category.GAME
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
actions: com.inmobi.share.id
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1260
Uncompressed size
2857042
Highest datetime
2016-02-02 16:43:10
Lowest datetime
2016-02-02 16:33:58
Contained files by extension
png
972
fnt
20
xml
6
scn
2
Contained files by type
PNG
972
XML
26
unknown
2
File identification
MD5 5ae61407e576743a154d638b1c690bbe
SHA1 9a38aff8c59b308172625c7a183cf68ffc020491
SHA256 3de21386006b8bbfe884e9a75402af895b16f26beaf62697ed5a51c92f238ae6
ssdeep
196608:T4Jrra9Sg9SI8hKpgkKISqDnfFrcDU+jOqokUAdBwIYGpPaf6Z32:GrreF8YKxMfFwyqoNAdmZMPaix2

File size 10.5 MB ( 11044683 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-02-12 23:16:09 UTC ( 2 years, 6 months ago )
Last submission 2016-02-12 23:16:09 UTC ( 2 years, 6 months ago )
File names com.neptundigital.colortraps.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!