× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5dadbfd577f4ff37ecab7cd481c1ca8cdbc33598c9ec50329053c343d7f8d597
File name: 1984e31a8570303762050391e02b8abe
Detection ratio: 0 / 54
Analysis date: 2016-07-18 19:01:51 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160718
AegisLab 20160718
AhnLab-V3 20160718
Alibaba 20160718
ALYac 20160718
Antiy-AVL 20160718
Arcabit 20160718
Avast 20160718
AVG 20160718
Avira (no cloud) 20160718
AVware 20160718
Baidu 20160718
BitDefender 20160718
Bkav 20160718
CAT-QuickHeal 20160718
ClamAV 20160718
CMC 20160715
Comodo 20160718
Cyren 20160718
DrWeb 20160718
Emsisoft 20160718
ESET-NOD32 20160718
F-Prot 20160718
F-Secure 20160718
Fortinet 20160718
GData 20160718
Ikarus 20160718
Jiangmin 20160718
K7AntiVirus 20160718
K7GW 20160718
Kaspersky 20160718
Kingsoft 20160718
Malwarebytes 20160718
McAfee 20160718
McAfee-GW-Edition 20160718
Microsoft 20160718
eScan 20160718
NANO-Antivirus 20160718
nProtect 20160718
Panda 20160718
Qihoo-360 20160718
Sophos AV 20160718
SUPERAntiSpyware 20160718
Symantec 20160718
Tencent 20160718
TheHacker 20160717
TotalDefense 20160718
TrendMicro 20160718
TrendMicro-HouseCall 20160718
VBA32 20160718
VIPRE 20160718
ViRobot 20160718
Zillya 20160718
Zoner 20160718
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.Neurocreativa.CthulhuVirtualPet. The internal version number of the application is 46. The displayed version string of the application is 2.1.24. The minimum Android API level for the application to run (MinSDKVersion) is 13. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.soomla.store.billing.google.GooglePlayIabService$IabActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.voxelbusters.nativeplugins.features.gameservices.serviceprovider.google.GooglePlayGameUIActivity
com.voxelbusters.nativeplugins.features.ui.UiActivity
com.twitter.sdk.android.core.identity.OAuthActivity
com.twitter.sdk.android.core.identity.ShareEmailActivity
Receivers
com.area730.localnotif.NotificationReciever
Providers
com.voxelbusters.nativeplugins.extensions.FileProviderExtended
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
643
Uncompressed size
151101627
Highest datetime
2016-07-11 19:45:38
Lowest datetime
2016-03-19 19:00:14
Contained files by extension
png
342
xml
46
dll
16
so
6
dex
1
MF
1
mdb
1
RSA
1
wav
1
SF
1
Contained files by type
PNG
342
unknown
232
XML
46
Portable Executable
16
ELF
6
DEX
1
File identification
MD5 1984e31a8570303762050391e02b8abe
SHA1 2d8b2614133fc8d53bcf09e19d7fbcd9e05e04bf
SHA256 5dadbfd577f4ff37ecab7cd481c1ca8cdbc33598c9ec50329053c343d7f8d597
ssdeep
786432:fGzyyjJPQTKSdsKRJ2i7hUDJKFQlj4ubTvIUH8xqq:fGWyjJPQTJsKRUi7h0JwQl0u3THLq

File size 27.7 MB ( 29014919 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2016-07-12 08:42:10 UTC ( 2 years, 10 months ago )
Last submission 2019-04-24 08:30:55 UTC ( 1 month ago )
File names 1984e31a8570303762050391e02b8abe
649147_559774_1_cthulhu_virtual_pet.apk
cthulhu-virtual-pet.apk
20abcc31bdb0aa8a9e8541c9a3abb9b2a9caf3e46fb4c947d8a16cf95362052cd84c7ac7e8a91f04547b8fa3bea5234b2f9d0b929a6ebd59879623b824d35518
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.Neurocreativa.CthulhuVirtualPet/files/sharing
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/data/com.Neurocreativa.CthulhuVirtualPet/files
/data/app/com.Neurocreativa.CthulhuVirtualPet-1.apk/assets/bin/Data/settings.xml