× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4101ca8ddbe0e077cfae33071fbfc45b93a773a5d929c07f5fd0726456fa1b57
File name: 599458_3f9907_net.elvista.checkers-76.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-10 09:27:51 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160610
AegisLab 20160610
AhnLab-V3 20160610
Alibaba 20160608
ALYac 20160610
Antiy-AVL 20160610
Arcabit 20160610
Avast 20160610
AVG 20160609
Avira (no cloud) 20160610
AVware 20160610
Baidu 20160608
Baidu-International 20160606
BitDefender 20160610
Bkav 20160610
CAT-QuickHeal 20160610
ClamAV 20160610
CMC 20160607
Comodo 20160610
Cyren 20160610
DrWeb 20160610
Emsisoft 20160610
ESET-NOD32 20160610
F-Prot 20160610
F-Secure 20160610
Fortinet 20160610
GData 20160610
Ikarus 20160610
Jiangmin 20160610
K7AntiVirus 20160610
K7GW 20160610
Kaspersky 20160610
Kingsoft 20160610
Malwarebytes 20160610
McAfee 20160610
McAfee-GW-Edition 20160610
Microsoft 20160610
eScan 20160610
NANO-Antivirus 20160610
nProtect 20160610
Panda 20160609
Qihoo-360 20160610
Rising 20160610
Sophos AV 20160610
SUPERAntiSpyware 20160610
Symantec 20160610
Tencent 20160610
TheHacker 20160610
TotalDefense 20160610
TrendMicro 20160610
TrendMicro-HouseCall 20160610
VBA32 20160609
VIPRE 20160610
ViRobot 20160610
Yandex 20160609
Zillya 20160609
Zoner 20160610
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.elvista.checkers. The internal version number of the application is 76. The displayed version string of the application is 2.3. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
net.elvista.checkers.permission.C2D_MESSAGE (C2DM permission.)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.ansca.corona.CoronaActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.purplebrain.adbuddiz.sdk.AdBuddizActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.InterstitialAdActivity
com.chartboost.sdk.CBImpressionActivity
com.vungle.sdk.VungleAdvert
com.apptracker.android.module.AppModuleActivity
com.fusepowered.nx.monetization.activities.InterstitialActivity
com.fusepowered.nx.videoplayer.VideoActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.google.android.gms.ads.AdActivity
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
com.fusepowered.m2.mobileads.M2Activity
com.fusepowered.m2.mobileads.M2RActivity
com.fusepowered.m2.common.M2Browser
com.fusepowered.m2.mobileads.M2RvpActivity
com.fusepowered.m1.android.MMActivity
com.fusepowered.m1.android.VideoPlayer
com.fusepowered.u1.U1InterstitialActivity
com.fusepowered.ads.adapters.FuseInterstitialActivity
com.fusepowered.l1.AdActivity
com.fusepowered.l1.AdBrowserActivity
com.fusepowered.l1.PlayerActivity
com.fusepowered.ac.ACOActivity
com.fusepowered.ac.ACFActivity
com.fusepowered.ac.ACBActivity
com.fusepowered.ads.adapters.LRActivity
com.fusepowered.ads.adapters.MRaidActivity
com.fusepowered.ads.adapters.MRaidVideoActivity
com.fusepowered.sa.android.publish.list3d.List3DActivity
com.fusepowered.sa.android.publish.AppWallActivity
com.fusepowered.as.view.ASVastInterstitialActivity
com.fusepowered.as.view.ASWebviewInterstitialActivity
com.fusepowered.ap.MainActivity
com.fusepowered.ap.BrowserActivity
com.fusepowered.ap.VDActivity
com.fusepowered.al.adview.ALInterstitialActivity
com.fusepowered.al.adview.ALConfirmationActivity
com.fusepowered.ads.adapters.ALActivity
com.fusepowered.im.androidsdk.IMBrowserActivity
com.fusepowered.ads.adapters.CBActivity
com.fusepowered.vast.activity.VASTActivity
Services
com.ansca.corona.CoronaService
com.vungle.sdk.VungleIntentService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
Providers
com.ansca.corona.storage.FileContentProvider
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
actions: com.fusepowered.fuseactivities.FuseApiMoregamesBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: net.elvista.checkers
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
781
Uncompressed size
47932724
Highest datetime
2016-04-01 12:59:36
Lowest datetime
2016-02-18 02:23:44
Contained files by extension
png
584
jpg
107
mp3
19
so
12
ttf
7
xml
1
dex
1
MF
1
car
1
db
1
RSA
1
SF
1
txt
1
Contained files by type
PNG
584
JPG
107
directory
41
MP3
19
unknown
15
ELF
12
XML
1
DEX
1
HTML
1
File identification
MD5 2f6a56a8df2574b607bedd2eca553511
SHA1 134fdd489aa2d491b4a306f506c3ddf608478736
SHA256 4101ca8ddbe0e077cfae33071fbfc45b93a773a5d929c07f5fd0726456fa1b57
ssdeep
786432:2KIU52wJhm4+3HQByoXMeZrOOeNZRyyGbkwJ:RtDJkFXQBLMCrOOeNZRtIbJ

File size 45.7 MB ( 47959919 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (50.9%)
Java Archive (14.0%)
BlueEyes Animation (13.1%)
Sweet Home 3D design (generic) (10.1%)
Mozilla Archive Format (gen) (6.7%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2016-04-01 22:39:39 UTC ( 2 years, 11 months ago )
Last submission 2019-02-01 23:25:14 UTC ( 1 month, 2 weeks ago )
File names checkers-elite.apk
net.elvista.checkers-1.apk
599458_3f9907_net.elvista.checkers-76.apk
wawki-2.3.apk
checkers-hd-2.3.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.SCREEN_ON
android.intent.action.USER_PRESENT
android.media.RINGER_MODE_CHANGED
Opened files
/data/app/net.elvista.checkers-1.apk
/data/data/net.elvista.checkers/cache/.system/temp
/data/data/net.elvista.checkers/cache/.system
/data/data/net.elvista.checkers/files/coronaResources
Accessed files
/mnt/sdcard/Android/obb/net.elvista.checkers
/data/data/net.elvista.checkers/cache/.system/NotificationSettings.xml