× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 3fca379b3e7d33d38eb29507a5feb870aff26689fb540478b8113c68c58718d2
File name: com.yamuir.pivotlightsaber.apk
Detection ratio: 0 / 60
Analysis date: 2017-05-11 16:36:06 UTC ( 2 years ago ) View latest
Antivirus Result Update
Ad-Aware 20170511
AegisLab 20170511
AhnLab-V3 20170511
Alibaba 20170511
ALYac 20170511
Antiy-AVL 20170511
Arcabit 20170511
Avast 20170511
AVG 20170511
Avira (no cloud) 20170511
AVware 20170511
Baidu 20170503
BitDefender 20170511
Bkav 20170511
CAT-QuickHeal 20170511
ClamAV 20170511
CMC 20170510
Comodo 20170511
CrowdStrike Falcon (ML) 20170130
Cyren 20170511
DrWeb 20170511
Emsisoft 20170511
Endgame 20170503
ESET-NOD32 20170511
F-Prot 20170511
F-Secure 20170511
Fortinet 20170511
GData 20170511
Ikarus 20170511
Sophos ML 20170413
Jiangmin 20170510
K7AntiVirus 20170511
K7GW 20170511
Kaspersky 20170511
Kingsoft 20170511
Malwarebytes 20170511
McAfee 20170511
McAfee-GW-Edition 20170511
Microsoft 20170511
eScan 20170511
NANO-Antivirus 20170511
nProtect 20170511
Palo Alto Networks (Known Signatures) 20170511
Panda 20170511
Qihoo-360 20170511
Rising None
SentinelOne (Static ML) 20170330
Sophos AV 20170511
SUPERAntiSpyware 20170511
Symantec 20170511
Symantec Mobile Insight 20170511
Tencent 20170511
TheHacker 20170508
TotalDefense 20170511
TrendMicro 20170511
TrendMicro-HouseCall 20170511
VBA32 20170511
VIPRE 20170511
ViRobot 20170511
Webroot 20170511
WhiteArmor 20170502
Yandex 20170510
Zillya 20170511
ZoneAlarm by Check Point 20170511
Zoner 20170511
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.yamuir.pivotlightsaber. The internal version number of the application is 15. The displayed version string of the application is 1.0.26. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.yamuir.pivotlightsaber.Game
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Activity-related intent filters
com.yamuir.pivotlightsaber.Game
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
305
Uncompressed size
8386243
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
208
xml
56
ogg
26
jpg
8
dex
1
MF
1
RSA
1
wav
1
SF
1
Contained files by type
PNG
208
XML
55
OGG
26
JPG
8
unknown
7
DEX
1
File identification
MD5 60cad2a22c60d251826a2990a61ac166
SHA1 7465804b611c91037b575587ae0a93ccb4d6b170
SHA256 3fca379b3e7d33d38eb29507a5feb870aff26689fb540478b8113c68c58718d2
ssdeep
98304:nkgP7Y1cKmWrk1t7zn6FtZr/4u1dge/0Bxx1SIu5pK7O5fgf:nkgD8cKYdnejr/xWe/e1S99a

File size 5.2 MB ( 5419399 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (54.6%)
Java Archive (15.1%)
BlueEyes Animation (14.0%)
Sweet Home 3D design (generic) (10.9%)
ZIP compressed archive (4.1%)
Tags
apk android dyn-class

VirusTotal metadata
First submission 2016-10-21 07:06:58 UTC ( 2 years, 7 months ago )
Last submission 2019-05-19 21:18:24 UTC ( 6 days, 9 hours ago )
File names 6756233176645415579
com.yamuir.pivotlightsaber.apk
com.yamuir.pivotlightsaber.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:com.yamuir.pivotlightsaber
android.permission.INTERNET:com.yamuir.pivotlightsaber
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
/data/data/com.yamuir.pivotlightsaber/cache/1460683162801.jar
/data/data/com.yamuir.pivotlightsaber/cache
/data/data/com.yamuir.pivotlightsaber/cache/1460683162801.dex
Accessed files
/data/data/com.yamuir.pivotlightsaber/cache/1460683162801.jar
/data/data/com.yamuir.pivotlightsaber/cache/1460683162801.tmp
/data/data/com.yamuir.pivotlightsaber/cache/1460683162801.dex
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.h
com.google.android.ads.zxxz.g
com.google.android.ads.zxxz.m
com.google.android.ads.zxxz.l
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.j
com.google.android.ads.zxxz.a
com.google.android.ads.zxxz.o
com.google.android.ads.zxxz.f
com.google.android.ads.zxxz.n
com.google.android.ads.zxxz.k
com.google.android.ads.zxxz.e
com.google.android.ads.zxxz.i
Contacted URLs
http://yamuir.com/android/appsInfo/appsInfo.php?ver=0
http://yamuir.com/android/appsInfo/A5/Icon.png
http://yamuir.com/android/appsInfo/A6/Icon.png
http://yamuir.com/android/appsInfo/A7/Icon.png
http://yamuir.com/android/appsInfo/A8/Icon.png
http://yamuir.com/android/appsInfo/A9/Icon.png
http://yamuir.com/android/appsInfo/A10/Icon.png
http://yamuir.com/android/appsInfo/A11/Icon.png
http://yamuir.com/android/appsInfo/A12/Icon.png
http://yamuir.com/android/appsInfo/A13/Icon.png
http://yamuir.com/android/appsInfo/A14/Icon.png
http://yamuir.com/android/appsInfo/A17/Icon.png
http://yamuir.com/android/appsInfo/A18/Icon.png
http://yamuir.com/android/appsInfo/A19/Icon.png
http://yamuir.com/android/appsInfo/A20/Icon.png
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads
http://www.example.com