× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5e037f47d1ed9f00dd16170854d59ee171b78c08cda0876233ffd1d8fced1ba5
File name: Titanic v2.4.apk
Detection ratio: 31 / 56
Analysis date: 2016-12-24 09:01:31 UTC ( 2 years, 4 months ago )
Antivirus Result Update
Ad-Aware Android.Adware.Dowgin.CW 20161224
AegisLab Android.Adware.Dowgin!c 20161224
AhnLab-V3 Android-PUP/Airpush.3e622 20161223
Antiy-AVL RiskWare[RiskTool:not-a-virus,HEUR]/Android.Gupno.1 20161224
Arcabit Android.Adware.Dowgin.CW 20161224
Avast Android:Gunpoder-C [PUP] 20161224
AVG Android/G2P.BY.4B72090579A3 20161224
Avira (no cloud) ADWARE/ANDR.Airpush.M.Gen 20161223
AVware Adware.AndroidOS.AirPush.a (v) 20161224
Baidu Android.Trojan.Agent.sz 20161207
BitDefender Android.Adware.Dowgin.CW 20161224
CAT-QuickHeal Android.Dowgin.C (AdWare) 20161223
Cyren AndroidOS/GenPua.176A54D2!Olympus 20161224
DrWeb Android.Hmad.1 20161224
Emsisoft Android.Adware.Dowgin.CW (B) 20161224
ESET-NOD32 a variant of Android/AdDisplay.AirPush.G potentially unwanted 20161224
F-Prot AndroidOS/Airpush.S 20161224
F-Secure Adware:Android/Dowgin 20161224
Fortinet Adware/AirPush!Android 20161224
GData Android.Adware.Dowgin.CW 20161224
Ikarus PUA.AndroidOS.Dowgin 20161224
K7GW Trojan ( 0001140e1 ) 20161224
Kaspersky not-a-virus:HEUR:AdWare.AndroidOS.Drosel.a 20161224
Kingsoft Android.Troj.Stealinfo.hd.(kcloud) 20161224
McAfee Artemis!176A54D2812B 20161224
NANO-Antivirus Trojan.Android.AdPush.dgtgig 20161223
Qihoo-360 Other.Android.Gen 20161224
Sophos AV Andr/Gunpoder-A 20161224
Tencent a.gray.mfpad 20161224
Trustlook Android.Trojan.Stealinfo 20161224
WhiteArmor Android-Malware.SN-Sure.4613612901113846.[Adware] 20161221
Alibaba 20161223
ClamAV 20161224
CMC 20161224
Comodo 20161224
CrowdStrike Falcon (ML) 20161024
Sophos ML 20161216
Jiangmin 20161224
K7AntiVirus 20161224
Malwarebytes 20161224
McAfee-GW-Edition 20161224
Microsoft 20161224
eScan 20161224
nProtect 20161224
Panda 20161223
Rising 20161224
SUPERAntiSpyware 20161223
Symantec 20161224
TheHacker 20161222
TotalDefense 20161224
TrendMicro 20161224
TrendMicro-HouseCall 20161224
VBA32 20161223
VIPRE 20161224
ViRobot 20161224
Yandex 20161223
Zillya 20161223
Zoner 20161224
The file being studied is Android related! APK Android file more specifically. The application's main package name is nes.fc.snk.nine5.mobo1.Titanic. The internal version number of the application is 5. The displayed version string of the application is 2.4. The minimum Android API level for the application to run (MinSDKVersion) is 9.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.READ_LOGS (read sensitive log data)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.BLUETOOTH (create Bluetooth connections)
android.permission.INTERNET (full Internet access)
android.permission.BLUETOOTH_ADMIN (bluetooth administration)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.SEND_SMS (send SMS messages)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_TASKS (retrieve running applications)
com.android.browser.permission.READ_HISTORY_BOOKMARKS (read Browser's history and bookmarks)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_SMS (read SMS or MMS)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.READ_CONTACTS (read contact data)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.androidemu.nes.MainActivity
com.androidemu.nes.FileChooser
com.androidemu.nes.StateSlotsActivity
com.androidemu.nes.KeyProfilesActivity
com.androidemu.nes.HelpActivity
com.androidemu.nes.DeviceListActivity
com.androidemu.nes.CheatsActivity
com.androidemu.nes.EmulatorSettings
com.androidemu.nes.EmulatorActivity
com.qlzemfj.eeiqusj157083.AdActivity
com.qlzemfj.eeiqusj157083.BrowserActivity
com.qlzemfj.eeiqusj157083.PlayActivity
com.umeng.update.UpdateDialogActivity
com.ose.a.a
com.appflood.AFSplashScreenActivity
com.appflood.mraid.MraidBrowserActivity
com.appflood.AFFullScreenActivity
Services
com.androidemu.nes.EmulatorService
com.qlzemfj.eeiqusj157083.UbService
com.qlzemfj.eeiqusj157083.AdService
com.umeng.update.net.DownloadingService
com.gunpoder.common.utils.FloatAdService
com.fcp.a.s
com.fx.a.s
Receivers
com.qlzemfj.eeiqusj157083.BootReceiver
com.fcp.a.fr
com.fx.a.br
com.ose.a.r
com.appflood.AFReferralReceiver
Activity-related intent filters
com.androidemu.nes.EmulatorActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
com.androidemu.nes.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.DEFAULT, android.intent.category.LAUNCHER
Receiver-related intent filters
com.ose.a.r
actions: android.intent.action.PACKAGE_ADDED, android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.USER_PRESENT, com.lseiei.downloadManager
com.qlzemfj.eeiqusj157083.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
com.appflood.AFReferralReceiver
actions: com.android.vending.INSTALL_REFERRER
com.fcp.a.fr
actions: android.intent.action.USER_PRESENT, android.net.conn.CONNECTIVITY_CHANGE, com.lseiei.downloadManager, android.intent.action.PACKAGE_ADDED
com.fx.a.br
actions: android.intent.action.USER_PRESENT, com.lseiei.downloadManager, android.intent.action.PACKAGE_ADDED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
232
Uncompressed size
6954315
Highest datetime
2015-05-12 21:52:48
Lowest datetime
2014-08-13 10:19:34
Contained files by extension
png
158
xml
56
so
6
dex
1
MF
1
RSA
1
jpg
1
SF
1
nes
1
Contained files by type
PNG
159
XML
56
unknown
8
ELF
6
HTML
2
DEX
1
File identification
MD5 176a54d2812ba6da0fff14dd5d5f6169
SHA1 a00b7f763057cdd9f44a7246a8af22050fc65d32
SHA256 5e037f47d1ed9f00dd16170854d59ee171b78c08cda0876233ffd1d8fced1ba5
ssdeep
98304:HzZ9WdfqWpMCgK5ExCv9JhB9Bnssj84vBoSen/C:T3IMXXCpVt84vk/C

File size 3.8 MB ( 3979722 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-05-14 00:58:37 UTC ( 4 years ago )
Last submission 2015-05-14 00:58:37 UTC ( 4 years ago )
File names Titanic v2.4.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!