× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5643bb402ad8b09d358b8dc019da2a0c8daf26a0a340528f9f5aa2b8855c3048
File name: 527692_976640_net.elvista.checkers-62.apk
Detection ratio: 0 / 57
Analysis date: 2016-06-05 02:58:54 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160605
AegisLab 20160604
AhnLab-V3 20160604
Alibaba 20160603
ALYac 20160605
Antiy-AVL 20160604
Arcabit 20160605
Avast 20160605
AVG 20160604
Avira (no cloud) 20160604
AVware 20160604
Baidu 20160603
Baidu-International 20160604
BitDefender 20160605
Bkav 20160604
CAT-QuickHeal 20160604
ClamAV 20160605
CMC 20160602
Comodo 20160605
Cyren 20160605
DrWeb 20160605
Emsisoft 20160605
ESET-NOD32 20160604
F-Prot 20160605
F-Secure 20160604
Fortinet 20160605
GData 20160605
Ikarus 20160604
Jiangmin 20160604
K7AntiVirus 20160604
K7GW 20160605
Kaspersky 20160605
Kingsoft 20160605
Malwarebytes 20160604
McAfee 20160605
McAfee-GW-Edition 20160605
Microsoft 20160605
eScan 20160605
NANO-Antivirus 20160605
nProtect 20160603
Panda 20160604
Qihoo-360 20160605
Rising 20160605
Sophos AV 20160604
SUPERAntiSpyware 20160604
Symantec 20160605
Tencent 20160605
TheHacker 20160604
TotalDefense 20160605
TrendMicro 20160605
TrendMicro-HouseCall 20160605
VBA32 20160603
VIPRE 20160605
ViRobot 20160604
Yandex 20160604
Zillya 20160603
Zoner 20160605
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.elvista.checkers. The internal version number of the application is 62. The displayed version string of the application is 2.1.3. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
net.elvista.checkers.permission.C2D_MESSAGE (C2DM permission.)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.ansca.corona.CoronaActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.purplebrain.adbuddiz.sdk.AdBuddizActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.InterstitialAdActivity
com.chartboost.sdk.CBImpressionActivity
com.vungle.sdk.VungleAdvert
com.apptracker.android.module.AppModuleActivity
com.fusepowered.nx.monetization.activities.InterstitialActivity
com.fusepowered.nx.videoplayer.VideoActivity
com.google.android.gms.ads.AdActivity
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
com.fusepowered.m2.mobileads.M2Activity
com.fusepowered.m2.mobileads.M2RActivity
com.fusepowered.m2.common.M2Browser
com.fusepowered.m2.mobileads.M2RvpActivity
com.fusepowered.m1.android.MMActivity
com.fusepowered.m1.android.VideoPlayer
com.fusepowered.u1.U1InterstitialActivity
com.fusepowered.ads.adapters.FuseInterstitialActivity
com.fusepowered.l1.AdActivity
com.fusepowered.l1.AdBrowserActivity
com.fusepowered.l1.PlayerActivity
com.fusepowered.ac.ACOActivity
com.fusepowered.ac.ACFActivity
com.fusepowered.ac.ACBActivity
com.fusepowered.ads.adapters.LRActivity
com.fusepowered.ads.adapters.MRaidActivity
com.fusepowered.ads.adapters.MRaidVideoActivity
com.fusepowered.sa.android.publish.list3d.List3DActivity
com.fusepowered.sa.android.publish.AppWallActivity
com.fusepowered.as.view.ASVastInterstitialActivity
com.fusepowered.as.view.ASWebviewInterstitialActivity
com.fusepowered.ap.MainActivity
com.fusepowered.ap.BrowserActivity
com.fusepowered.ap.VDActivity
com.fusepowered.al.adview.ALInterstitialActivity
com.fusepowered.al.adview.ALConfirmationActivity
com.fusepowered.ads.adapters.ALActivity
com.fusepowered.im.androidsdk.IMBrowserActivity
com.fusepowered.ads.adapters.CBActivity
com.fusepowered.vast.activity.VASTActivity
Services
com.ansca.corona.CoronaService
com.vungle.sdk.VungleIntentService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
Providers
com.ansca.corona.storage.FileContentProvider
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
actions: com.fusepowered.fuseactivities.FuseApiMoregamesBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: net.elvista.checkers
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
714
Uncompressed size
39345279
Highest datetime
2015-12-02 22:54:34
Lowest datetime
2015-10-05 17:13:38
Contained files by extension
png
523
jpg
101
mp3
19
so
12
ttf
7
xml
1
dex
1
MF
1
car
1
db
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
523
JPG
101
directory
41
MP3
19
unknown
15
ELF
12
XML
1
DEX
1
HTML
1
File identification
MD5 99f69e47d1477a77fe1e863c8214910a
SHA1 acd43e2d3338e6bc476b021fceb3a2a260826ea3
SHA256 5643bb402ad8b09d358b8dc019da2a0c8daf26a0a340528f9f5aa2b8855c3048
ssdeep
393216:GRy53KdazfKTQljRC/3bdvNqMX9W0KCWaWNoI9QgGCxYV9Hy++JG:lKoTKTU0fKmfWaWNoUQgG0YTUG

File size 37.5 MB ( 39370594 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (56.7%)
Java Archive (15.6%)
BlueEyes Animation (14.5%)
Mozilla Archive Format (gen) (7.5%)
ZIP compressed archive (4.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-12-03 00:48:55 UTC ( 3 years, 3 months ago )
Last submission 2018-10-09 22:57:05 UTC ( 5 months, 1 week ago )
File names checkers-elite.apk
527692_976640_net.elvista.checkers-62.apk
checkers-hd-2.1.3.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.SCREEN_ON
android.intent.action.USER_PRESENT
android.media.RINGER_MODE_CHANGED
Opened files
/data/app/net.elvista.checkers-1.apk
/data/data/net.elvista.checkers/cache/.system/temp
/data/data/net.elvista.checkers/cache/.system
/data/data/net.elvista.checkers/files/coronaResources
Accessed files
/mnt/sdcard/Android/obb/net.elvista.checkers
/data/data/net.elvista.checkers/cache/.system/NotificationSettings.xml