× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 435349f6b7a3ff3a85a6a8fa26a715666b1c9e50e5604ae8a6643277bd0dd6bf
File name: 411904_258cf6_com.julian.motorboat-4.apk
Detection ratio: 0 / 55
Analysis date: 2016-07-15 00:42:25 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160714
AegisLab 20160714
AhnLab-V3 20160714
Alibaba 20160714
ALYac 20160714
Antiy-AVL 20160714
Arcabit 20160714
Avast 20160714
AVG 20160714
Avira (no cloud) 20160714
AVware 20160714
Baidu 20160714
BitDefender 20160714
Bkav 20160714
CAT-QuickHeal 20160714
ClamAV 20160714
CMC 20160714
Comodo 20160714
Cyren 20160714
DrWeb 20160714
Emsisoft 20160714
ESET-NOD32 20160714
F-Prot 20160714
F-Secure 20160714
Fortinet 20160714
GData 20160714
Ikarus 20160714
Jiangmin 20160714
K7AntiVirus 20160714
K7GW 20160714
Kaspersky 20160714
Kingsoft 20160715
Malwarebytes 20160714
McAfee 20160714
McAfee-GW-Edition 20160714
Microsoft 20160714
eScan 20160714
NANO-Antivirus 20160714
nProtect 20160714
Panda 20160714
Qihoo-360 20160715
Sophos AV 20160714
SUPERAntiSpyware 20160714
Symantec 20160714
Tencent 20160715
TheHacker 20160714
TotalDefense 20160713
TrendMicro 20160714
TrendMicro-HouseCall 20160714
VBA32 20160714
VIPRE 20160714
ViRobot 20160714
Yandex 20160713
Zillya 20160714
Zoner 20160714
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.julian.motorboat. The internal version number of the application is 4. The displayed version string of the application is 1.3. The minimum Android API level for the application to run (MinSDKVersion) is 7. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.julian.motorboat.RiptideRacingActivity
com.doodlemobile.gamecenter.moregames.MoreGamesActivity
com.google.android.gms.ads.AdActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
Receivers
com.sponsorpay.advertiser.InstallReferrerReceiver
Activity-related intent filters
com.julian.motorboat.RiptideRacingActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.sponsorpay.advertiser.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
643
Uncompressed size
46708113
Highest datetime
2015-03-02 13:58:50
Lowest datetime
2014-12-11 20:34:06
Contained files by extension
png
141
xml
26
dll
7
so
4
dex
1
MF
1
RSA
1
jpg
1
js
1
SF
1
Contained files by type
unknown
464
PNG
141
XML
25
Portable Executable
7
ELF
4
DEX
1
JPG
1
Compressed bundles
File identification
MD5 dd4801343cc3702ff4ce3e3d537e80f9
SHA1 4dfec6d54c28d6ce7a4f015947fc3994f630a269
SHA256 435349f6b7a3ff3a85a6a8fa26a715666b1c9e50e5604ae8a6643277bd0dd6bf
ssdeep
393216:2a+2ceplp245RF6RbSLOIf33gHg6tKEW2fpK1vRBNIs+09NR/6RSBgL:aLePkS33gHY5QuZBSW9f6REgL

File size 16.2 MB ( 16957937 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (65.6%)
Java Archive (18.1%)
Konfabulator widget (10.0%)
ZIP compressed archive (5.0%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk contains-pe contains-elf android software-collection

VirusTotal metadata
First submission 2015-03-05 06:44:48 UTC ( 4 years ago )
Last submission 2019-01-20 20:45:13 UTC ( 2 months ago )
File names powerboatracing3d.apk
4_riptide_gp2.apk
com.julian.motorboat.apk
com.julian.motorboat_4_1.3_635616490046958655.apk
0_36e43cd8bbf2e68c26a24b2012d456f3.apk
carrerasmotoras3d.apk
435349f6b7a3ff3a85a6a8fa26a715666b1c9e50e5604ae8a6643277bd0dd6bf
package.apk
com.julian.motorboat-4.apk
09e4ddd859a7ad2d81295d9880775a4bd27453992337d685c2b941ffd02f33817816021fd653eca4d09d27aeedf64c4e8d3390c5452b66b50c293c2f0cc194ba
powerboat-racing-3d.apk
411904_258cf6_com.julian.motorboat-4.apk
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!