× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 41802ea636f8fc404c3a3a239bd8896a0cdf769fdfb68fa1ded7c9f14425512a
File name: 567798_ffb889_com.hotheadgames.google.free.rawsniper-27001401.apk
Detection ratio: 0 / 56
Analysis date: 2016-06-04 18:46:40 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160604
AegisLab 20160604
AhnLab-V3 20160604
Alibaba 20160603
ALYac 20160604
Antiy-AVL 20160604
Arcabit 20160604
Avast 20160604
AVG 20160604
AVware 20160604
Baidu 20160603
Baidu-International 20160604
BitDefender 20160604
Bkav 20160604
CAT-QuickHeal 20160604
ClamAV 20160604
CMC 20160602
Comodo 20160604
Cyren 20160604
DrWeb 20160604
Emsisoft 20160604
ESET-NOD32 20160604
F-Prot 20160604
F-Secure 20160604
Fortinet 20160604
GData 20160604
Ikarus 20160604
Jiangmin 20160604
K7AntiVirus 20160604
K7GW 20160604
Kaspersky 20160604
Kingsoft 20160604
Malwarebytes 20160604
McAfee 20160604
McAfee-GW-Edition 20160604
Microsoft 20160604
eScan 20160604
NANO-Antivirus 20160604
nProtect 20160603
Panda 20160604
Qihoo-360 20160604
Rising 20160604
Sophos AV 20160604
SUPERAntiSpyware 20160604
Symantec 20160604
Tencent 20160604
TheHacker 20160604
TotalDefense 20160604
TrendMicro 20160604
TrendMicro-HouseCall 20160604
VBA32 20160603
VIPRE 20160604
ViRobot 20160604
Yandex 20160604
Zillya 20160603
Zoner 20160604
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.hotheadgames.google.free.rawsniper. The internal version number of the application is 27001401. The displayed version string of the application is 2.7. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
com.hotheadgames.google.free.rawsniper.permission.C2D_MESSAGE (C2DM permission.)
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECORD_AUDIO (record audio)
Activities
com.hotheadgames.android.horque.HorqueActivity
com.hotheadgames.android.horque.thirdparty.PickFriendsActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.sponsorpay.mediation.hyprmx.mbe.HyprMXVideoActivity
com.hyprmx.android.sdk.activity.HyprMXOfferViewerActivity
com.hyprmx.android.sdk.activity.HyprMXRequiredInformationActivity
com.hyprmx.android.sdk.activity.HyprMXSplashActivity
com.hyprmx.android.sdk.activity.HyprMXOfferListActivity
com.hyprmx.android.sdk.activity.HyprMXNoOffersActivity
com.hyprmx.android.sdk.activity.HyprMXWebTrafficActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.chartboost.sdk.CBImpressionActivity
com.facebook.FacebookActivity
com.facebook.ads.InterstitialAdActivity
com.vungle.publisher.FullScreenAdActivity
com.sponsorpay.publisher.mbe.SPBrandEngageActivity
com.sponsorpay.publisher.interstitial.SPInterstitialActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.kamcord.android.KamcordActivity
com.kamcord.android.ReplayActivity
com.kamcord.android.WebActivity
com.helpshift.HSConversation
com.helpshift.HSQuestionsList
com.helpshift.HSQuestion
com.helpshift.HSSection
com.helpshift.HSFaqs
com.helpshift.HSReview
com.helpshift.ScreenshotPreviewActivity
com.helpshift.SearchResultActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
Services
org.openudid.OpenUDID_service
com.hyprmx.android.sdk.service.ApplicationInstallService
com.vungle.publisher.VungleService
com.kamcord.android.UploadService
com.helpshift.HSService
com.helpshift.HSRetryService
com.hotheadgames.android.horque.thirdparty.AndroidSwrveGcmIntentService
Receivers
com.hotheadgames.android.horque.AlarmReceiver
com.hotheadgames.android.horque.HorqueReceiver
com.hotheadgames.android.horque.GcmReceiver
Service-related intent filters
org.openudid.OpenUDID_service
actions: org.openudid.GETUDID
Activity-related intent filters
com.hotheadgames.android.horque.HorqueActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.hotheadgames.android.horque.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.hotheadgames.google.free.rawsniper
com.hotheadgames.android.horque.HorqueReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
569
Uncompressed size
67694140
Highest datetime
2016-02-04 18:21:08
Lowest datetime
2016-02-04 18:01:16
Contained files by extension
png
427
xml
121
so
6
otf
3
mp3
2
dex
1
MF
1
RSA
1
js
1
txt
1
SF
1
Contained files by type
PNG
427
XML
121
unknown
14
ELF
6
DEX
1
File identification
MD5 3c1ee070bc5f332719ec78a712b53194
SHA1 a5d82e9be693c1867b30200f7cee195f586ddae7
SHA256 41802ea636f8fc404c3a3a239bd8896a0cdf769fdfb68fa1ded7c9f14425512a
ssdeep
1572864:1Fx7+dvrBbrMdVdiUj82SnpMpoWMxQyhbJPfpwb:7xydvr9AHwCo3hbxpc

File size 53.6 MB ( 56163550 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk checks-gps android contains-elf

VirusTotal metadata
First submission 2016-02-13 04:48:57 UTC ( 3 years, 1 month ago )
Last submission 2018-12-10 19:55:01 UTC ( 3 months, 1 week ago )
File names kill-shot.apk
com.hotheadgames.google.free.rawsniper-3.apk
9-3c1ee070bc5f332719ec78a712b53194-1456753851.apk
kill-shot-2.7.apk
567798_ffb889_com.hotheadgames.google.free.rawsniper-27001401.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal.tmp
/data/data/com.hotheadgames.google.free.rawsniper/cache/volley
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http
/data/data/com.hotheadgames.google.free.rawsniper/files
/mnt/sdcard/Android/data/com.hotheadgames.google.free.rawsniper/files
/mnt/sdcard/Android/data/com.hotheadgames.google.free.rawsniper/cache
Accessed files
/data/data/com.hotheadgames.google.free.rawsniper/cache/volley
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal.bkp
/data/data/com.hotheadgames.google.free.rawsniper/cache/me.kiip.sdk/http/journal
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
https://api.kiip.me/2.0/app/cache