× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 49eedd7ce7c1430bb74a0cbd26193e2f34e0bdcfc9a491f827000d67f511c88d
File name: 49EEDD7CE7C1430BB74A0CBD26193E2F34E0BDCFC9A491F827000D67F511C88D
Detection ratio: 0 / 62
Analysis date: 2018-10-08 18:37:34 UTC ( 4 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181008
AegisLab 20181008
AhnLab-V3 20181008
Alibaba 20180921
ALYac 20181008
Antiy-AVL 20181008
Arcabit 20181008
Avast 20181008
Avast-Mobile 20181008
AVG 20181008
Avira (no cloud) 20181008
AVware 20180925
Babable 20180918
Baidu 20181008
BitDefender 20181008
Bkav 20181008
CAT-QuickHeal 20181008
ClamAV 20181008
CMC 20181008
Comodo 20181008
CrowdStrike Falcon (ML) 20180723
Cybereason 20180308
Cylance 20181008
Cyren 20181008
DrWeb 20181008
eGambit 20181008
Emsisoft 20181008
Endgame 20180730
ESET-NOD32 20181008
F-Prot 20181008
F-Secure 20181008
Fortinet 20181008
GData 20181008
Ikarus 20181008
Sophos ML 20180717
Jiangmin 20181008
K7AntiVirus 20181008
K7GW 20181008
Kaspersky 20181008
Kingsoft 20181008
Malwarebytes 20181008
MAX 20181008
McAfee 20181008
McAfee-GW-Edition 20181008
Microsoft 20181008
eScan 20181008
NANO-Antivirus 20181008
Palo Alto Networks (Known Signatures) 20181008
Panda 20181008
Qihoo-360 20181008
Rising 20181008
SentinelOne (Static ML) 20180926
Sophos AV 20181008
SUPERAntiSpyware 20181006
Symantec 20181008
Symantec Mobile Insight 20181001
TACHYON 20181008
Tencent 20181008
TheHacker 20181008
TotalDefense 20181008
TrendMicro 20181008
TrendMicro-HouseCall 20181008
Trustlook 20181008
VBA32 20181008
VIPRE 20181008
ViRobot 20181008
Webroot 20181008
Yandex 20181008
Zillya 20181008
ZoneAlarm by Check Point 20181008
Zoner 20181008
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.ansangha.drjb. The internal version number of the application is 33. The displayed version string of the application is 1.33. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.ansangha.drjb.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.ansangha.drjb.GameActivity
com.google.android.gms.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.android.billingclient.api.ProxyBillingActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.ansangha.drjb.GameActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.ansangha.drjb
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
416
Uncompressed size
24427661
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
132
obj
125
xml
56
ogg
46
jpg
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
178
PNG
132
XML
56
OGG
46
JPG
3
DEX
1
File identification
MD5 cba51ab628fafb8b519234d0d383eebd
SHA1 69518453945b74eace6a9be87f21a82d1801ef08
SHA256 49eedd7ce7c1430bb74a0cbd26193e2f34e0bdcfc9a491f827000d67f511c88d
ssdeep
393216:YMaPR7z/5kpoiWTZjNJNy1UmjoqeyDLX490eU/DSWmI1wUBY5/l2PcB5:Yhkpoi0ZxJNSUpmo90eU/eWmIaMel2PC

File size 18.9 MB ( 19768442 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android

VirusTotal metadata
First submission 2018-09-03 20:20:18 UTC ( 5 months, 3 weeks ago )
Last submission 2019-02-17 12:59:55 UTC ( 5 days, 3 hours ago )
File names Dr-Driving-2-1.33-www.weandroid.ir.apk
Dr_Driving_2_1.33www.APKupdate.com.apk
dr-driving-2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!