× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5be2d93313fc774215273c8b16f765b9bdcdb3d5ac132e39e7ffd36c0f26bc95
File name: eiEWy9a_6bVWBNEnYnsR20170801-17691-1pezupj
Detection ratio: 0 / 62
Analysis date: 2017-08-01 07:36:54 UTC ( 1 year, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170801
AegisLab 20170801
AhnLab-V3 20170801
Alibaba 20170801
ALYac 20170801
Antiy-AVL 20170801
Arcabit 20170801
Avast 20170801
AVG 20170801
Avira (no cloud) 20170801
AVware 20170801
Baidu 20170728
BitDefender 20170801
Bkav 20170731
CAT-QuickHeal 20170731
ClamAV 20170801
CMC 20170801
Comodo 20170801
CrowdStrike Falcon (ML) 20170710
Cylance 20170801
Cyren 20170801
DrWeb 20170801
Emsisoft 20170801
Endgame 20170721
ESET-NOD32 20170801
F-Prot 20170801
F-Secure 20170801
Fortinet 20170801
GData 20170801
Ikarus 20170731
Sophos ML 20170607
Jiangmin 20170801
K7AntiVirus 20170801
K7GW 20170801
Kaspersky 20170801
Kingsoft 20170801
Malwarebytes 20170801
MAX 20170801
McAfee 20170801
McAfee-GW-Edition 20170801
Microsoft 20170801
eScan 20170801
NANO-Antivirus 20170801
nProtect 20170801
Palo Alto Networks (Known Signatures) 20170801
Panda 20170731
Qihoo-360 20170801
Rising 20170801
SentinelOne (Static ML) 20170718
Sophos AV 20170801
SUPERAntiSpyware 20170801
Symantec 20170801
Symantec Mobile Insight 20170801
Tencent 20170801
TheHacker 20170730
TotalDefense 20170801
TrendMicro 20170801
TrendMicro-HouseCall 20170801
Trustlook 20170801
VBA32 20170731
VIPRE 20170801
ViRobot 20170801
Webroot 20170801
WhiteArmor 20170731
Yandex 20170728
Zillya 20170731
ZoneAlarm by Check Point 20170801
Zoner 20170801
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.igg.android.lordsmobile. The internal version number of the application is 104. The displayed version string of the application is 1.46. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.igg.android.lordsmobile.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.igg.iggsdkbusiness.IGGSDKPlugin
com.unity3d.player.VideoPlayer
com.outlinegames.unibill.PurchaseActivity
com.igg.iggsdkbusiness.IGGWebView
com.igg.iggsdkbusiness.TapjoyView
com.prime31.ReauthorizationProxy
com.facebook.FacebookActivity
com.igg.android.wegamers.auth.AuthActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
Services
com.igg.iggsdkbusiness.GCMIntentService
com.unity3d.plugin.downloader.UnityDownloaderService
Receivers
com.igg.iggsdkbusiness.GCMBroadcastReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.igg.iggsdkbusiness.LocalNotificationReceiver
com.igg.iggsdkbusiness.AuthRequestReceiver
com.unity3d.plugin.downloader.UnityAlarmReceiver
Activity-related intent filters
com.igg.android.wegamers.auth.AuthActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.igg.iggsdkbusiness.IGGSDKPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.igg.iggsdkbusiness.AuthRequestReceiver
actions: com.igg.android.game.authreceiver
com.igg.iggsdkbusiness.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.igg.android.lordsmobile
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
477
Uncompressed size
33937333
Highest datetime
2017-07-27 14:18:20
Lowest datetime
2015-08-28 10:44:10
Contained files by extension
png
319
xml
137
dll
7
so
5
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
319
XML
137
unknown
9
Portable Executable
6
ELF
5
DEX
1
File identification
MD5 31edd6bb98b51c7324cdf5beebce17a1
SHA1 292c7bfe25864859f2a19b35cc6ab177726232f2
SHA256 5be2d93313fc774215273c8b16f765b9bdcdb3d5ac132e39e7ffd36c0f26bc95
ssdeep
393216:+emlCWHbJvx3jrzEX6Eyt4Av1o5jHYvDxgu0rOIe:+emBDTrBtP1ol9at

File size 13.8 MB ( 14497909 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-07-31 10:37:47 UTC ( 1 year, 6 months ago )
Last submission 2018-08-17 17:23:09 UTC ( 6 months ago )
File names com.igg.android.lordsmobile.apk
lords-mobile.apk
eiEWy9a_6bVWBNEnYnsR20170801-17691-1pezupj
31edd6bb98b51c7324cdf5beebce17a1
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!