× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4dd3eb17325a8b7110bc867f34fa5af5130c2333fae5a6e9c12c943798fdf4f1
File name: amso3cl2YoVsZtEqfDMcJSSPPgt1IV1qrYWkaj
Detection ratio: 0 / 62
Analysis date: 2018-04-04 00:20:46 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20180403
AegisLab 20180403
AhnLab-V3 20180403
Alibaba 20180403
ALYac 20180403
Antiy-AVL 20180403
Arcabit 20180403
Avast 20180403
Avast-Mobile 20180403
AVG 20180403
Avira (no cloud) 20180404
AVware 20180404
Baidu 20180403
BitDefender 20180404
Bkav 20180403
CAT-QuickHeal 20180403
ClamAV 20180403
CMC 20180403
Comodo 20180404
CrowdStrike Falcon (ML) 20170201
Cybereason 20180225
Cylance 20180404
Cyren 20180403
DrWeb 20180403
eGambit 20180404
Emsisoft 20180403
Endgame 20180403
ESET-NOD32 20180403
F-Prot 20180403
F-Secure 20180403
Fortinet 20180403
GData 20180403
Ikarus 20180403
Sophos ML 20180121
Jiangmin 20180403
K7AntiVirus 20180403
K7GW 20180403
Kaspersky 20180403
Kingsoft 20180404
Malwarebytes 20180403
MAX 20180404
McAfee 20180403
McAfee-GW-Edition 20180403
Microsoft 20180403
eScan 20180403
NANO-Antivirus 20180403
nProtect 20180403
Palo Alto Networks (Known Signatures) 20180404
Panda 20180403
Qihoo-360 20180404
Rising 20180404
SentinelOne (Static ML) 20180225
Sophos AV 20180403
SUPERAntiSpyware 20180403
Symantec 20180403
Symantec Mobile Insight 20180401
Tencent 20180404
TheHacker 20180330
TotalDefense 20180403
TrendMicro 20180404
TrendMicro-HouseCall 20180403
Trustlook 20180404
VBA32 20180403
VIPRE 20180403
ViRobot 20180403
WhiteArmor 20180403
Yandex 20180403
Zillya 20180403
ZoneAlarm by Check Point 20180403
Zoner 20180403
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nekki.shadowfight. The internal version number of the application is 1000106. The displayed version string of the application is 1.9.35. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.nekki.shadowfight.permission.C2D_MESSAGE (C2DM permission.)
com.android.alarm.permission.SET_ALARM (set alarm in alarm clock)
android.permission.SET_ORIENTATION (change screen orientation)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
com.google.android.c2dm.permission.REGISTRATION (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nekki.shadowfight.Main
com.chartboost.sdk.CBImpressionActivity
com.flurry.android.CatalogActivity
com.ideaworks3d.marmalade.s3eAndroidGooglePlayBilling.PurchaseProxy
com.facebook.LoginActivity
com.fyber.ads.videos.RewardedVideoActivity
com.fyber.ads.interstitials.InterstitialActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.chartboost.sdk.CBImpressionActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.inmobi.rendering.InMobiAdActivity
com.facebook.ads.InterstitialAdActivity
com.hyprmx.android.sdk.activity.HyprMXOfferViewerActivity
com.hyprmx.android.sdk.activity.HyprMXRequiredInformationActivity
com.hyprmx.android.sdk.activity.HyprMXNoOffersActivity
com.hyprmx.android.sdk.activity.HyprMXWebTrafficActivity
com.hyprmx.android.sdk.activity.HyprMXVideoPlayerActivity
com.fyber.mediation.hyprmx.rv.HyprMXVideoMediationActivity
com.google.android.gms.ads.AdActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
Services
com.hullabu.ac3.HullabuDownloaderService
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyDownloaderService
com.fyber.cache.CacheVideoDownloadService
com.hullabu.ac3.HullabuDownloaderService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.nekki.androidnotifications.TimeAlarm
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyAlarmReceiver
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
com.tapjoy.InstallReferrerReceiver
com.tapjoy.GCMReceiver
com.tapjoy.TapjoyReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.hullabu.ac3.TimeAlarm
com.marmalade.studio.android.gcm.s3eGCMClientLocalReceiver
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
Providers
com.ideaworks3d.marmalade.VFSProvider
Activity-related intent filters
com.nekki.shadowfight.Main
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, tv.ouya.intent.category.GAME
com.flurry.android.CatalogActivity
actions: s3e.offer.intent
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nekki.shadowfight
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
actions: com.inmobi.share.id
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.tapjoy.GCMReceiver
actions: com.google.android.c2dm.intent.REGISTRATION, com.google.android.c2dm.intent.RECEIVE, com.google.android.gcm.intent.RETRY
categories: com.nekki.shadowfight
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2348
Uncompressed size
30979927
Highest datetime
2018-02-06 16:30:22
Lowest datetime
1980-01-01 03:00:00
Contained files by extension
png
820
jpg
54
xml
16
fnt
16
icf
4
MF
1
RSA
1
s3e
1
txt
1
SF
1
Contained files by type
PNG
820
XML
87
JPG
54
unknown
39
File identification
MD5 91f45bbe6fb489f57f2c4dbcc54a1c74
SHA1 b8f54a578ffc147fac4fe1078400952d582d522b
SHA256 4dd3eb17325a8b7110bc867f34fa5af5130c2333fae5a6e9c12c943798fdf4f1
ssdeep
1572864:97ERpM9lzc5dKvuz4gdWlTgpkGuBwifNGY8Zw44nsrSW8ILKyH7W1Mioin9:97JlPviWl9GGJNzNsWX6wuA9

File size 86.1 MB ( 90311123 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (61.4%)
Java Archive (16.9%)
BlueEyes Animation (15.7%)
ZIP compressed archive (4.6%)
PrintFox/Pagefox bitmap (var. P) (1.1%)
Tags
apk android

VirusTotal metadata
First submission 2018-02-08 13:00:41 UTC ( 1 year, 3 months ago )
Last submission 2019-02-03 10:35:21 UTC ( 3 months, 2 weeks ago )
File names shadow-fight-2-1-9-35.apk
amso3cl2YoVsZtEqfDMcJSSPPgt1IV1qrYWkaj
4dd3eb17325a8b7110bc867f34fa5af5130c2333fae5a6e9c12c943798fdf4f1.file
base.apk
shadow-fight-2.apk
shadow-fight-2-1.9.35.apk
933119_7f425b_com.nekki.shadowfight.apk
amsoT1w3r2GttOEd
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!