× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5029d036be6b61bae260b2439885862685234377c7f592c9e043dd6dd6efea26
File name: 6f147a4c536c50e1759f07435e6d6187.apk
Detection ratio: 0 / 61
Analysis date: 2018-12-05 21:20:43 UTC ( 2 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20181205
AegisLab 20181205
AhnLab-V3 20181205
Alibaba 20180921
ALYac 20181205
Arcabit 20181205
Avast 20181206
Avast-Mobile 20181205
AVG 20181206
Avira (no cloud) 20181205
AVware 20180925
Babable 20180918
Baidu 20181205
BitDefender 20181205
Bkav 20181205
CAT-QuickHeal 20181205
ClamAV 20181205
CMC 20181205
Comodo 20181205
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181205
Cyren 20181205
DrWeb 20181205
eGambit 20181205
Emsisoft 20181205
Endgame 20181108
ESET-NOD32 20181205
F-Prot 20181205
F-Secure 20181206
Fortinet 20181205
GData 20181205
Ikarus 20181205
Sophos ML 20181128
Jiangmin 20181205
K7AntiVirus 20181205
K7GW 20181205
Kaspersky 20181205
Kingsoft 20181205
Malwarebytes 20181205
MAX 20181205
McAfee 20181205
McAfee-GW-Edition 20181205
Microsoft 20181205
eScan 20181205
NANO-Antivirus 20181205
Palo Alto Networks (Known Signatures) 20181205
Panda 20181205
Qihoo-360 20181205
Rising 20181205
SentinelOne (Static ML) 20181011
Sophos AV 20181205
SUPERAntiSpyware 20181205
Symantec 20181205
Symantec Mobile Insight 20181204
TACHYON 20181205
Tencent 20181205
TheHacker 20181202
TotalDefense 20181205
Trapmine 20181205
TrendMicro 20181206
TrendMicro-HouseCall 20181205
Trustlook 20181205
VBA32 20181205
VIPRE 20181205
ViRobot 20181205
Webroot 20181205
Yandex 20181204
Zillya 20181204
ZoneAlarm by Check Point 20181205
Zoner 20181205
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.ansangha.drjb. The internal version number of the application is 35. The displayed version string of the application is 1.35. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.ansangha.drjb.permission.C2D_MESSAGE (C2DM permission.)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
External libraries
org.apache.http.legacy
Activities
com.ansangha.drjb.GameActivity
com.google.android.gms.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.android.billingclient.api.ProxyBillingActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.ansangha.drjb.GameActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.ansangha.drjb
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
405
Uncompressed size
24255907
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
132
obj
125
xml
56
ogg
46
jpg
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
167
PNG
132
XML
56
OGG
46
JPG
3
DEX
1
File identification
MD5 6f147a4c536c50e1759f07435e6d6187
SHA1 dbcb4449bbeb4fed970fafdd78151b1cb33ab3c4
SHA256 5029d036be6b61bae260b2439885862685234377c7f592c9e043dd6dd6efea26
ssdeep
393216:xMaPR7z/5kpoWWTZjNJNy1UmjoqeyDLX490eU/DSWmI1wFCep/1CQQFJeP:xhkpoW0ZxJNSUpmo90eU/eWmIaFF9y4P

File size 18.8 MB ( 19740095 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android

VirusTotal metadata
First submission 2018-10-01 05:32:54 UTC ( 4 months, 3 weeks ago )
Last submission 2019-01-16 23:29:06 UTC ( 1 month, 1 week ago )
File names dr-driving-2-v1.35-apknature.com.apk
com.ansangha.drjb-1547681163%28www.apk4down.com%29.apk
994523_cd95be_com.ansangha.drjb_1.35_35.apk
6f147a4c536c50e1759f07435e6d6187.apk
dr-driving-2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!