× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 43f1a385c65d568407f5cc98e008035b0d71218e1154452d3acebd54f63d00c3
File name: com.gs.stickman.whitehouseescape-1.apk
Detection ratio: 0 / 53
Analysis date: 2016-12-21 15:26:40 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20161221
AegisLab 20161221
AhnLab-V3 20161221
Alibaba 20161221
ALYac 20161221
Antiy-AVL 20161221
Arcabit 20161221
Avast 20161221
AVG 20161221
Avira (no cloud) 20161221
AVware 20161221
Baidu 20161207
BitDefender 20161221
CAT-QuickHeal 20161221
ClamAV 20161221
CMC 20161221
Comodo 20161221
CrowdStrike Falcon (ML) 20161024
Cyren 20161221
DrWeb 20161221
Emsisoft 20161221
ESET-NOD32 20161221
F-Prot 20161221
F-Secure 20161221
Fortinet 20161221
GData 20161221
Sophos ML 20161216
Jiangmin 20161221
K7AntiVirus 20161221
K7GW 20161221
Kaspersky 20161221
Kingsoft 20161221
Malwarebytes 20161221
McAfee 20161221
McAfee-GW-Edition 20161221
Microsoft 20161221
eScan 20161221
NANO-Antivirus 20161221
nProtect 20161221
Panda 20161220
Qihoo-360 20161221
Rising 20161221
Sophos AV 20161221
SUPERAntiSpyware 20161221
Symantec 20161221
Tencent 20161221
TheHacker 20161219
TrendMicro 20161221
TrendMicro-HouseCall 20161221
Trustlook 20161221
VBA32 20161221
VIPRE 20161221
ViRobot 20161221
WhiteArmor 20161212
Yandex 20161221
Zillya 20161220
Zoner 20161221
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.gs.stickman.whitehouseescape. The internal version number of the application is 9. The displayed version string of the application is 1.7. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.inmobi.androidsdk.IMBrowserActivity
com.facebook.ads.InterstitialAdActivity
com.vungle.publisher.FullScreenAdActivity
com.playhaven.android.view.FullScreen
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.prime31.GoogleIABProxyActivity
com.google.games.bridge.NativeBridgeActivity
com.millennialmedia.internal.MMActivity
com.millennialmedia.internal.MMIntentWrapperActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.mediabrix.android.service.AdViewActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.geniteam.fuelPushManager.MyService
com.mediabrix.android.service.MediaBrixService
Receivers
com.heyzap.sdk.ads.PackageAddedReceiver
com.playhaven.android.push.PushReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerProxyActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.playhaven.android.view.FullScreen
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.playhaven.android.push.PushReceiver
actions: android.intent.action.VIEW
categories: com.playhaven.android
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
636
Uncompressed size
143742204
Highest datetime
2016-11-14 21:55:40
Lowest datetime
2015-06-08 15:35:52
Contained files by extension
png
283
xml
84
dll
16
js
4
so
3
zip
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
283
unknown
247
XML
84
Portable Executable
16
ELF
3
ZIP
2
DEX
1
File identification
MD5 d3227896bd3baabb2f8e1d29603cea6d
SHA1 12b7b04db3adf89901abce19b1208999d2a67099
SHA256 43f1a385c65d568407f5cc98e008035b0d71218e1154452d3acebd54f63d00c3
ssdeep
1572864:C1oIonzC8t+yJav/fDOFOPmtVAC3ABhdGLrS3X:DIyzC6AfDaPVQBgrG

File size 56.2 MB ( 58911649 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2016-12-21 15:26:40 UTC ( 2 years, 3 months ago )
Last submission 2016-12-21 15:26:40 UTC ( 2 years, 3 months ago )
File names com.gs.stickman.whitehouseescape-1.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!