× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4006153cc9a7d51ccb8ad213ac510e90ebf9a08a877b60b7d820340550c55f01
File name: com.supercell.clashroyale-5.apk
Detection ratio: 0 / 57
Analysis date: 2018-11-23 21:42:39 UTC ( 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20181123
AegisLab 20181123
AhnLab-V3 20181123
Alibaba 20180921
ALYac 20181123
Antiy-AVL 20181123
Arcabit 20181123
Avast 20181123
Avast-Mobile 20181123
AVG 20181123
Avira (no cloud) 20181123
Babable 20180918
Baidu 20181123
BitDefender 20181123
Bkav 20181123
CAT-QuickHeal 20181123
ClamAV 20181123
CMC 20181123
Comodo 20181123
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181123
Cyren 20181123
DrWeb 20181123
eGambit 20181123
Emsisoft 20181123
Endgame 20181108
ESET-NOD32 20181123
F-Prot 20181123
F-Secure 20181123
Fortinet 20181123
GData 20181123
Ikarus 20181123
Sophos ML 20181108
Jiangmin 20181123
K7AntiVirus 20181123
K7GW 20181123
Kaspersky 20181123
Kingsoft 20181123
Malwarebytes 20181123
MAX 20181123
McAfee 20181123
McAfee-GW-Edition 20181123
Microsoft 20181123
eScan 20181123
NANO-Antivirus 20181123
Palo Alto Networks (Known Signatures) 20181123
Panda 20181123
Qihoo-360 20181123
Rising 20181123
SentinelOne (Static ML) 20181011
Sophos AV 20181123
SUPERAntiSpyware 20181121
Symantec 20181123
Symantec Mobile Insight 20181121
TACHYON 20181123
Tencent 20181123
TheHacker 20181118
Trapmine 20180918
TrendMicro 20181123
TrendMicro-HouseCall 20181123
Trustlook 20181123
VBA32 20181123
ViRobot 20181123
Webroot 20181123
Yandex 20181123
Zillya 20181123
ZoneAlarm by Check Point 20181123
Zoner 20181123
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.supercell.clashroyale. The internal version number of the application is 318. The displayed version string of the application is 2.4.1. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.supercell.clashroyale.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.FOREGROUND_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.supercell.clashroyale.GameApp
com.helpshift.support.activities.ParentActivity
com.helpshift.support.HSReview
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.supercell.clashroyale.GCMIntentService
Receivers
com.supercell.clashroyale.TimeAlarm
com.google.android.gcm.GCMBroadcastReceiver
com.mobileapptracker.Tracker
Providers
com.helpshift.support.providers.HelpshiftFileProvider
com.facebook.internal.FacebookInitProvider
Activity-related intent filters
com.supercell.clashroyale.GameApp
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.mobileapptracker.Tracker
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.supercell.clashroyale
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1901
Uncompressed size
87929504
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
wav
587
sc
183
csv
129
ktx
29
png
21
ogg
16
scw
6
ttf
4
xml
1
MF
1
fsh
1
RSA
1
fnt
1
vsh
1
SF
1
Contained files by type
unknown
961
PNG
21
OGG
16
XML
1
JSON
1
File identification
MD5 265c70554d224751b45c418ef636de28
SHA1 f7b15bc4365e508a9eea0cf312255549279fe150
SHA256 4006153cc9a7d51ccb8ad213ac510e90ebf9a08a877b60b7d820340550c55f01
ssdeep
1572864:8PJwquy1G4lEgQt5kU45VnJ5XcyBxswoTb3NmNaIPR9bZXhBGiDCHLres1Yke9fM:2eqT1GzFrWVJpgXAPzbnnGHLnY3xz0Z

File size 98.3 MB ( 103114422 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (51.4%)
SPSS Extension (29.4%)
Java Archive (14.2%)
ZIP compressed archive (3.9%)
PrintFox/Pagefox bitmap (var. P) (0.9%)
Tags
apk android

VirusTotal metadata
First submission 2018-09-05 11:38:46 UTC ( 5 months, 2 weeks ago )
Last submission 2018-12-08 08:04:04 UTC ( 2 months, 2 weeks ago )
File names clash-royale-2-4-1.apk
clash-royale.apk
com.supercell.clashroyale-8.apk
com.supercell.clashroyale-5.apk
base.apk
KXSkir_5mGY8fWAf6KtD20180905-13326-8ekj12
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!