× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4b5797bf5ac7e46dd022e2e04b097454a6f528b00bb0dc3c65e3f9c4d2b4a823
File name: 1495285807-c1509abfee3f95b2ad6fa3e89bf6c371.apk
Detection ratio: 0 / 60
Analysis date: 2017-05-20 13:11:06 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170520
AegisLab 20170520
AhnLab-V3 20170519
Alibaba 20170519
ALYac 20170519
Antiy-AVL 20170520
Arcabit 20170520
Avast 20170520
AVG 20170520
Avira (no cloud) 20170520
AVware 20170520
Baidu 20170503
BitDefender 20170520
Bkav 20170520
CAT-QuickHeal 20170520
ClamAV 20170520
CMC 20170519
Comodo 20170520
CrowdStrike Falcon (ML) 20170130
Cyren 20170520
DrWeb 20170520
Emsisoft 20170520
Endgame 20170515
ESET-NOD32 20170520
F-Prot 20170520
F-Secure 20170520
Fortinet 20170520
GData 20170520
Ikarus 20170520
Sophos ML 20170519
Jiangmin 20170520
K7AntiVirus 20170520
K7GW 20170520
Kaspersky 20170520
Kingsoft 20170520
Malwarebytes 20170520
McAfee 20170520
McAfee-GW-Edition 20170520
Microsoft 20170520
eScan 20170520
NANO-Antivirus 20170519
nProtect 20170519
Palo Alto Networks (Known Signatures) 20170520
Panda 20170520
Qihoo-360 20170520
Rising None
SentinelOne (Static ML) 20170516
Sophos AV 20170520
SUPERAntiSpyware 20170520
Symantec 20170519
Symantec Mobile Insight 20170518
Tencent 20170520
TheHacker 20170516
TotalDefense 20170520
TrendMicro 20170520
TrendMicro-HouseCall 20170520
VBA32 20170519
VIPRE 20170520
ViRobot 20170520
Webroot 20170520
WhiteArmor 20170517
Yandex 20170518
Zillya 20170520
ZoneAlarm by Check Point 20170520
Zoner 20170520
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.rubycell.violin. The internal version number of the application is 20161217. The displayed version string of the application is 20161217. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
.permission.C2D_MESSAGE (C2DM permission.)
com.rubycell.violin.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.ansca.corona.CoronaActivity
com.rubycell.factory.RequestPermissionActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.facebook.FacebookActivity
plugin.facebook.v4.FacebookFragmentActivity
com.onesignal.PermissionsActivity
plugin.signin.GoogleSignIn
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
plugin.sharedsongs.activity.TabActivity
plugin.sharedsongs.activity.RequestSongActivity
plugin.sharedsongs.activity.CommentActivity
plugin.sharedsongs.activity.ARequestSongActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.ansca.corona.CoronaService
com.onesignal.GcmIntentService
com.onesignal.SyncService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
com.onesignal.NotificationOpenedReceiver
com.onesignal.GcmBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.facebook.FacebookContentProvider
com.ansca.corona.storage.FileContentProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementReceiver
actions: com.google.android.gms.measurement.UPLOAD
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.onesignal.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.rubycell.violin
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1296
Uncompressed size
29277533
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
597
xml
63
so
14
gui
11
jpg
10
mid
5
ogg
3
ttf
2
opt
1
dex
1
MF
1
car
1
sf2
1
RSA
1
mp3
1
SF
1
Contained files by type
PNG
597
MIDI
240
unknown
68
XML
62
ELF
14
JPG
10
JSON
4
OGG
3
DEX
1
MP3
1
File identification
MD5 c1509abfee3f95b2ad6fa3e89bf6c371
SHA1 226083c6a50c07e1b0e8ec565edd9aa2760f584b
SHA256 4b5797bf5ac7e46dd022e2e04b097454a6f528b00bb0dc3c65e3f9c4d2b4a823
ssdeep
393216:Hqxje6f1ehSKWJcUEL3mM4it1BmcqorZb/a05wve9Kip:Hq9e6g8t2VmM401MFkZb+YZ

File size 17.9 MB ( 18802069 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (62.8%)
Java Archive (17.3%)
VYM Mind Map (14.9%)
ZIP compressed archive (4.7%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2016-12-17 16:03:26 UTC ( 2 years, 3 months ago )
Last submission 2017-06-28 18:08:58 UTC ( 1 year, 8 months ago )
File names 1491246411-c1509abfee3f95b2ad6fa3e89bf6c371.apk
APKupdate_com_rubycell_violin-20161217.apk
violin-for-everyone.apk
1495285807-c1509abfee3f95b2ad6fa3e89bf6c371.apk
1487886821-c1509abfee3f95b2ad6fa3e89bf6c371.apk
1485037973-ec15101a14e96a6d00694c2a7aa2b39e.apk
Violin-v20161217-Pdalife.ru.apk
com.rubycell.violin-2.apk
c1509abfee3f95b2ad6fa3e89bf6c371
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.SCREEN_ON
android.intent.action.USER_PRESENT
android.media.RINGER_MODE_CHANGED
Opened files
/data/app/com.rubycell.violin-1.apk
/data/data/com.rubycell.violin/no_backup
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core
/data/data/com.rubycell.violin/cache/.system
/data/data/com.rubycell.violin/cache/.system/temp
/data/data/com.rubycell.violin/files/coronaResources
Accessed files
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core
/data/data/com.rubycell.violin/no_backup
/data/data/com.rubycell.violin/no_backup/com.google.android.gms.appid-no-backup
/data/data/com.rubycell.violin/databases/google_app_measurement.db
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/initialization_marker