× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4d2542152ee30eee7992dca3fc7688e0c8dfe035af1d54aa5f508231d9f339aa
File name: base.apk
Detection ratio: 0 / 59
Analysis date: 2017-05-17 00:54:26 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170516
AegisLab 20170516
AhnLab-V3 20170516
Alibaba 20170516
ALYac 20170516
Antiy-AVL 20170517
Arcabit 20170516
Avast 20170517
AVG 20170516
Avira (no cloud) 20170517
AVware 20170517
Baidu 20170503
BitDefender 20170516
Bkav 20170516
CAT-QuickHeal 20170516
ClamAV 20170516
CMC 20170516
Comodo 20170516
CrowdStrike Falcon (ML) 20170130
Cyren 20170517
DrWeb 20170517
Emsisoft 20170517
Endgame 20170515
ESET-NOD32 20170517
F-Prot 20170517
F-Secure 20170517
Fortinet 20170516
GData 20170517
Ikarus 20170516
Sophos ML 20170516
Jiangmin 20170516
K7AntiVirus 20170516
K7GW 20170517
Kaspersky 20170517
Kingsoft 20170517
Malwarebytes 20170517
McAfee 20170517
McAfee-GW-Edition 20170516
Microsoft 20170516
eScan 20170516
NANO-Antivirus 20170517
nProtect 20170516
Palo Alto Networks (Known Signatures) 20170517
Panda 20170516
Qihoo-360 20170517
Rising None
SentinelOne (Static ML) 20170516
Sophos AV 20170516
SUPERAntiSpyware 20170517
Symantec 20170516
Symantec Mobile Insight 20170517
Tencent 20170517
TheHacker 20170516
TrendMicro 20170516
Trustlook 20170517
VBA32 20170516
VIPRE 20170517
ViRobot 20170516
Webroot 20170517
WhiteArmor 20170512
Yandex 20170516
Zillya 20170516
ZoneAlarm by Check Point 20170516
Zoner 20170517
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.rubycell.violin. The internal version number of the application is 20170515. The displayed version string of the application is 20170515. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
.permission.C2D_MESSAGE (C2DM permission.)
com.rubycell.violin.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.ansca.corona.CoronaActivity
com.rubycell.factory.RequestPermissionActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.facebook.FacebookActivity
plugin.facebook.v4.FacebookFragmentActivity
com.onesignal.PermissionsActivity
plugin.signin.GoogleSignIn
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
plugin.sharedsongs.activity.TabActivity
plugin.sharedsongs.activity.RequestSongActivity
plugin.sharedsongs.activity.CommentActivity
plugin.sharedsongs.activity.ARequestSongActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.ansca.corona.CoronaService
com.onesignal.GcmIntentService
com.onesignal.SyncService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
com.onesignal.NotificationOpenedReceiver
com.onesignal.GcmBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.facebook.FacebookContentProvider
com.ansca.corona.storage.FileContentProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementReceiver
actions: com.google.android.gms.measurement.UPLOAD
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.onesignal.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.rubycell.violin
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1356
Uncompressed size
27078476
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
585
xml
80
so
14
gui
11
jpg
10
ogg
3
ttf
2
dex
1
MF
1
car
1
sf2
1
mid
1
RSA
1
SF
1
js
1
Contained files by type
PNG
585
MIDI
236
XML
79
unknown
68
ELF
14
JPG
10
JSON
4
OGG
3
DEX
1
File identification
MD5 40ecd7ab047d70a42f08941b2cee80c9
SHA1 ae166e29a4477030a1e2bf09e2f5710eba0f938b
SHA256 4d2542152ee30eee7992dca3fc7688e0c8dfe035af1d54aa5f508231d9f339aa
ssdeep
393216:7e6f1ehSKWJcUE13mM4a++F/d8Kf9cVboStIoxZ1lteYtkP:7e6g8t2bmM4alFXf9cFoSmoxzn7SP

File size 16.2 MB ( 17031176 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (55.2%)
Java Archive (15.2%)
VYM Mind Map (13.1%)
Sweet Home 3D design (generic) (11.0%)
ZIP compressed archive (4.2%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2017-05-17 00:54:26 UTC ( 1 year, 10 months ago )
Last submission 2017-11-06 12:46:43 UTC ( 1 year, 4 months ago )
File names base.apk
violin-for-everyone.apk
violin-for-everyone.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!