× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 53238fc03ac974918317bfecc40db007721138f9544748d89e6282e552500893
File name: com.rubycell.violin-2.apk
Detection ratio: 0 / 58
Analysis date: 2016-11-24 10:36:03 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20161124
AegisLab 20161124
AhnLab-V3 20161124
Alibaba 20161124
ALYac 20161124
Antiy-AVL 20161124
Arcabit 20161124
Avast 20161124
AVG 20161124
Avira (no cloud) 20161124
AVware 20161124
Baidu 20161124
BitDefender 20161124
Bkav 20161124
CAT-QuickHeal 20161124
ClamAV 20161124
CMC 20161124
Comodo 20161124
CrowdStrike Falcon (ML) 20161024
Cyren 20161124
DrWeb 20161124
Emsisoft 20161124
ESET-NOD32 20161124
F-Prot 20161124
F-Secure 20161124
Fortinet 20161124
GData 20161124
Ikarus 20161124
Sophos ML 20161018
Jiangmin 20161124
K7AntiVirus 20161124
K7GW 20161124
Kaspersky 20161124
Kingsoft 20161124
Malwarebytes 20161124
McAfee 20161124
McAfee-GW-Edition 20161124
Microsoft 20161124
eScan 20161124
NANO-Antivirus 20161124
nProtect 20161124
Panda 20161123
Qihoo-360 20161124
Rising 20161124
Sophos AV 20161124
SUPERAntiSpyware 20161124
Symantec 20161124
Tencent 20161124
TheHacker 20161124
TotalDefense 20161124
TrendMicro 20161124
TrendMicro-HouseCall 20161124
Trustlook 20161124
VBA32 20161123
VIPRE 20161124
ViRobot 20161124
WhiteArmor 20161018
Yandex 20161123
Zillya 20161123
Zoner 20161124
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.rubycell.violin. The internal version number of the application is 20161030. The displayed version string of the application is 20161030. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
.permission.C2D_MESSAGE (C2DM permission.)
com.rubycell.violin.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.ansca.corona.CoronaActivity
com.rubycell.factory.RequestPermissionActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.facebook.FacebookActivity
plugin.facebook.v4.FacebookFragmentActivity
com.onesignal.PermissionsActivity
plugin.signin.GoogleSignIn
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
plugin.sharedsongs.activity.TabActivity
plugin.sharedsongs.activity.RequestSongActivity
plugin.sharedsongs.activity.CommentActivity
plugin.sharedsongs.activity.ARequestSongActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.ansca.corona.CoronaService
com.onesignal.GcmIntentService
com.onesignal.SyncService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
com.onesignal.NotificationOpenedReceiver
com.onesignal.GcmBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.facebook.FacebookContentProvider
com.ansca.corona.storage.FileContentProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementReceiver
actions: com.google.android.gms.measurement.UPLOAD
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.rubycell.violin
com.onesignal.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.rubycell.violin
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1233
Uncompressed size
26456221
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
619
xml
48
so
14
gui
11
jpg
9
ogg
3
ttf
2
dex
1
MF
1
car
1
sf2
1
mid
1
RSA
1
SF
1
Contained files by type
PNG
619
MIDI
236
unknown
67
XML
47
ELF
14
JPG
9
JSON
4
OGG
3
DEX
1
File identification
MD5 68bd94abeb06a95408aa81b54541e7a1
SHA1 7d6d0875886d619ec4d61d5e0867bcb603c60989
SHA256 53238fc03ac974918317bfecc40db007721138f9544748d89e6282e552500893
ssdeep
393216:Xe6f1ehSKWJcUE13/Q4QngmXDyZuCaXdjUsYU7e5wv:Xe6g8t2b44q7W4/vHIwv

File size 15.8 MB ( 16536996 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (62.8%)
Java Archive (17.3%)
VYM Mind Map (14.9%)
ZIP compressed archive (4.7%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2016-10-31 14:41:16 UTC ( 2 years, 4 months ago )
Last submission 2017-06-28 18:08:50 UTC ( 1 year, 8 months ago )
File names com.rubycell.violin-2.apk
violin-for-everyone.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.SCREEN_ON
android.intent.action.USER_PRESENT
android.media.RINGER_MODE_CHANGED
Opened files
/data/app/com.rubycell.violin-1.apk
/data/data/com.rubycell.violin/no_backup
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core
/data/data/com.rubycell.violin/cache/.system
/data/data/com.rubycell.violin/cache/.system/temp
/data/data/com.rubycell.violin/files/coronaResources
Accessed files
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core
/data/data/com.rubycell.violin/no_backup
/data/data/com.rubycell.violin/no_backup/com.google.android.gms.appid-no-backup
/data/data/com.rubycell.violin/databases/google_app_measurement.db
/data/data/com.rubycell.violin/files/.Fabric/com.crashlytics.sdk.android.crashlytics-core/initialization_marker