× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5869a300bae253e44cda7e70ebf6a6956157c635d7f97d299e428ef6e80761d6
File name: [androidapplications.ru]com.tapinator.cyborgcityrampage.apk
Detection ratio: 1 / 61
Analysis date: 2018-02-13 01:29:25 UTC ( 11 months, 1 week ago )
Antivirus Result Update
WhiteArmor PUP.HighConfidence 20180205
Ad-Aware 20180213
AegisLab 20180213
AhnLab-V3 20180213
Alibaba 20180209
ALYac 20180213
Antiy-AVL 20180213
Arcabit 20180213
Avast 20180213
Avast-Mobile 20180212
AVG 20180213
Avira (no cloud) 20180213
AVware 20180210
Baidu 20180208
BitDefender 20180213
Bkav 20180212
CAT-QuickHeal 20180212
ClamAV 20180212
CMC 20180212
Comodo 20180213
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180213
Cyren 20180213
DrWeb 20180213
eGambit 20180213
Emsisoft 20180213
Endgame 20171130
ESET-NOD32 20180213
F-Prot 20180213
F-Secure 20180213
Fortinet 20180213
GData 20180213
Ikarus 20180212
Sophos ML 20180121
Jiangmin 20180212
K7AntiVirus 20180212
K7GW 20180212
Kaspersky 20180213
Kingsoft 20180213
Malwarebytes 20180213
MAX 20180213
McAfee 20180213
McAfee-GW-Edition 20180213
Microsoft 20180213
eScan 20180213
NANO-Antivirus 20180213
nProtect 20180213
Palo Alto Networks (Known Signatures) 20180213
Panda 20180212
Qihoo-360 20180213
Rising 20180213
SentinelOne (Static ML) 20180115
Sophos AV 20180213
SUPERAntiSpyware 20180212
Symantec 20180213
Symantec Mobile Insight 20180212
Tencent 20180213
TheHacker 20180208
TrendMicro 20180213
Trustlook 20180213
VBA32 20180212
VIPRE 20180213
ViRobot 20180213
Webroot 20180213
Yandex 20180210
Zillya 20180212
ZoneAlarm by Check Point 20180213
Zoner 20180213
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tapinator.cyborgcityrampage. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.google.android.gms.ads.AdActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.mediabrix.android.service.AdViewActivity
com.facebook.ads.InterstitialAdActivity
com.playhaven.android.view.FullScreen
com.google.games.bridge.NativeBridgeActivity
com.millennialmedia.internal.MMActivity
com.millennialmedia.internal.MMIntentWrapperActivity
com.facebook.LoginActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.mediabrix.android.service.MediaBrixService
Receivers
com.heyzap.sdk.ads.PackageAddedReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
categories: android.intent.category.LEANBACK_LAUNCHER
com.unity3d.player.UnityPlayerProxyActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.playhaven.android.view.FullScreen
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
908
Uncompressed size
136824138
Highest datetime
2016-11-18 18:10:14
Lowest datetime
2008-02-29 09:33:46
Contained files by extension
png
246
xml
78
dll
17
js
3
so
3
zip
2
dex
1
MF
1
mdb
1
RSA
1
mp4
1
txt
1
SF
1
Contained files by type
unknown
561
PNG
246
XML
78
Portable Executable
17
ELF
3
ZIP
2
DEX
1
File identification
MD5 aa1e1e4d55cdb0aa9223d88d95689e4e
SHA1 1155cdda643c422d81aad5850784273f575c0437
SHA256 5869a300bae253e44cda7e70ebf6a6956157c635d7f97d299e428ef6e80761d6
ssdeep
1572864:lmbbOJUsMxiCZ2z7KqrTge5EBSYspQPdKNyep:lmeuKCZ2zeqrceh3pQPdK0ep

File size 48.5 MB ( 50841964 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID
Tags
apk android contains-pe contains-elf

VirusTotal metadata
First submission 2018-02-13 01:29:25 UTC ( 11 months, 1 week ago )
Last submission 2018-02-13 01:29:25 UTC ( 11 months, 1 week ago )
File names [androidapplications.ru]com.tapinator.cyborgcityrampage.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!