× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 67a15a90a3c9f0f3b6adcf3e3cd646e97c142e517363cb8e34c8e12fe3840ba4
File name: 839797ff16ec946b3e4380324b470132
Detection ratio: 0 / 60
Analysis date: 2019-02-17 16:59:44 UTC ( 2 months ago ) View latest
Antivirus Result Update
Acronis 20190213
Ad-Aware 20190217
AegisLab 20190217
AhnLab-V3 20190217
Alibaba 20180921
ALYac 20190217
Antiy-AVL 20190217
Arcabit 20190217
Avast 20190217
Avast-Mobile 20190217
AVG 20190217
Avira (no cloud) 20190217
Babable 20180918
Baidu 20190215
BitDefender 20190217
Bkav 20190216
CAT-QuickHeal 20190217
ClamAV 20190217
CMC 20190217
Comodo 20190217
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cylance 20190217
Cyren 20190217
DrWeb 20190217
eGambit 20190217
Emsisoft 20190217
Endgame 20190215
ESET-NOD32 20190217
F-Prot 20190217
F-Secure 20190217
Fortinet 20190217
GData 20190217
Ikarus 20190217
Sophos ML 20181128
Jiangmin 20190217
K7AntiVirus 20190217
K7GW 20190217
Kaspersky 20190217
Kingsoft 20190217
Malwarebytes 20190217
MAX 20190217
McAfee 20190217
McAfee-GW-Edition 20190217
Microsoft 20190217
eScan 20190217
NANO-Antivirus 20190217
Palo Alto Networks (Known Signatures) 20190217
Panda 20190217
Qihoo-360 20190217
Rising 20190217
SentinelOne (Static ML) 20190203
Sophos AV 20190217
SUPERAntiSpyware 20190213
Symantec 20190217
Symantec Mobile Insight 20190207
TACHYON 20190217
Tencent 20190217
TheHacker 20190217
TotalDefense 20190217
Trapmine 20190123
TrendMicro 20190217
TrendMicro-HouseCall 20190217
Trustlook 20190217
VBA32 20190215
VIPRE 20190217
ViRobot 20190217
Webroot 20190217
Yandex 20190215
Zillya 20190215
ZoneAlarm by Check Point 20190217
Zoner 20190217
The file being studied is Android related! APK Android file more specifically. The application's main package name is at.nerbrothers.SuperJump. The internal version number of the application is 1082. The displayed version string of the application is 3.1.5. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
at.nerbrothers.SuperJump.LepSplash
at.nerbrothers.SuperJump.SuperJump
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.ironsource.sdk.controller.ControllerActivity
com.ironsource.sdk.controller.InterstitialActivity
com.ironsource.sdk.controller.OpenUrlActivity
com.vungle.warren.ui.VungleActivity
com.vungle.warren.ui.VungleFlexViewActivity
com.vungle.warren.ui.VungleWebViewActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.android.billingclient.api.ProxyBillingActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
at.nerbrothers.util.AlaramReceiver
com.vungle.warren.NetworkStateReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
com.google.android.gms.ads.MobileAdsInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
at.nerbrothers.SuperJump.LepSplash
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.vungle.warren.NetworkStateReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1653
Uncompressed size
13871116
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
766
tmx
187
fnt
6
xml
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
766
XML
214
unknown
20
File identification
MD5 839797ff16ec946b3e4380324b470132
SHA1 b05b15134f89fe909c63f9557a8cc384ddbb773d
SHA256 67a15a90a3c9f0f3b6adcf3e3cd646e97c142e517363cb8e34c8e12fe3840ba4
ssdeep
393216:bEsjSjJeYIVcGIxrsE4LoxTvf9AQq7kOfQvAMogNmhC5kVrjJkbTKtf1y9tbDNtc:bzSj4Y4exYZUTvf93TOovHNoC5IMeKds

File size 23.4 MB ( 24536682 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android

VirusTotal metadata
First submission 2019-01-25 22:07:51 UTC ( 2 months, 3 weeks ago )
Last submission 2019-03-06 14:42:56 UTC ( 1 month, 1 week ago )
File names 109_0e51ece06a0e455b8f4d1f54a517900d.apk
lep-s-world.apk
leps-world-3.1.5.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!