× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4d7b1ee06aff36c856be94f11a85ef6e32860776b3f7fdda655430066e36ae03
File name: 805231_570b17_dead_ahead_1.1.1_mod.apk
Detection ratio: 5 / 59
Analysis date: 2017-02-23 18:56:02 UTC ( 2 years, 3 months ago )
Antivirus Result Update
Bkav Android.Malware.SDi.EDC7 20170223
Symantec Trojan.Gen.8 20170223
Trustlook Android.Adware.Admob 20170223
WhiteArmor Android-PUA.SN-Sure.36373246233837576144080650.[PUA] 20170222
Zillya Trojan.Agent.Android.24781 20170223
Ad-Aware 20170223
AegisLab 20170223
AhnLab-V3 20170223
Alibaba 20170223
ALYac 20170223
Antiy-AVL 20170223
Arcabit 20170223
Avast 20170223
AVG 20170223
Avira (no cloud) 20170223
AVware 20170223
Baidu 20170223
BitDefender 20170223
CAT-QuickHeal 20170223
ClamAV 20170223
CMC 20170223
Comodo 20170223
CrowdStrike Falcon (ML) 20170130
Cyren 20170223
DrWeb 20170223
Emsisoft 20170223
Endgame 20170222
ESET-NOD32 20170223
F-Prot 20170223
F-Secure 20170223
Fortinet 20170223
GData 20170223
Ikarus 20170223
Sophos ML 20170203
Jiangmin 20170223
K7AntiVirus 20170223
K7GW 20170223
Kaspersky 20170223
Kingsoft 20170223
Malwarebytes 20170223
McAfee 20170223
McAfee-GW-Edition 20170223
Microsoft 20170223
eScan 20170223
NANO-Antivirus 20170223
nProtect 20170223
Panda 20170223
Qihoo-360 20170223
Rising 20170223
Sophos AV 20170223
SUPERAntiSpyware 20170223
Tencent 20170223
TheHacker 20170223
TotalDefense 20170223
TrendMicro 20170223
TrendMicro-HouseCall 20170223
VBA32 20170223
VIPRE 20170223
ViRobot 20170223
Webroot 20170223
Yandex 20170222
Zoner 20170223
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.chillingo.deadahead.rowgplay. The internal version number of the application is 111. The displayed version string of the application is 1.1.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.chillingo.deadahead.rowgplay.Main
com.facebook.LoginActivity
com.mobirate.s3eFacebookSDK.PickerActivity
com.chillingo.libterms.ui.TermsActivity
com.burstly.lib.component.networkcomponent.burstly.BurstlyFullscreenActivity
com.google.ads.AdActivity
com.greystripe.sdk.GSFullscreenActivity
com.inmobi.androidsdk.IMBrowserActivity
com.millennialmedia.android.MMActivity
com.burstly.lib.component.networkcomponent.jumptap.JumptapActivity
com.fusepowered.fuseactivities.FuseApiAdBrowser
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
com.fusepowered.m2.m2l.M2Activity
com.fusepowered.m2.m2l.M2RActivity
com.fusepowered.m2.m2l.M2RBrowser
com.fusepowered.m2.m2l.M2RvpActivity
com.fusepowered.m1.android.MMActivity
com.fusepowered.m1.android.VideoPlayer
com.fusepowered.a1.A1InterstitialActivity
Providers
com.ideaworks3d.marmalade.VFSProvider
Activity-related intent filters
com.fusepowered.fuseactivities.FuseApiAdBrowser
actions: com.fusepowered.fuseactivities.FuseApiAdBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
com.chillingo.deadahead.rowgplay.Main
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
actions: com.fusepowered.fuseactivities.FuseApiMoregamesBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
220
Uncompressed size
27279377
Highest datetime
2008-02-29 08:33:46
Lowest datetime
2008-02-29 08:33:46
Contained files by extension
png
156
xml
38
so
11
mp3
6
dex
1
MF
1
RSA
1
mp4
1
dz
1
s3e
1
SF
1
Contained files by type
PNG
156
XML
38
ELF
11
unknown
7
MP3
6
DEX
1
ZIP
1
File identification
MD5 364ddccba5ca3e165b79603342d78a85
SHA1 a894121e0c1e50ecdeb503ced25168acf987f68b
SHA256 4d7b1ee06aff36c856be94f11a85ef6e32860776b3f7fdda655430066e36ae03
ssdeep
393216:YZF1Cp6jv7f1LGZf2db4BIxrZpoij+Ux1Mm1xp+DAg0w2nT9oPFFDg:uu6jj1S+jZnj+871ECT9UfDg

File size 22.1 MB ( 23170302 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (92.9%)
ZIP compressed archive (7.0%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2014-03-28 20:41:32 UTC ( 5 years, 2 months ago )
Last submission 2017-02-23 18:56:02 UTC ( 2 years, 3 months ago )
File names Dead_Ahead_v1.1.1_Mod_Money_lenov.ru.apk
Dead-Ahead.apk
Dead-Ahead-v1-1-1-mod[vzlomandroid-apk.ru].apk
805231_570b17_dead_ahead_1.1.1_mod.apk
Dead_Ahead_mod-1_1_1.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!