× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 69aa3dbfdc2b4c356d3eb7f2bcbbb8b003e4973fff7db79db63e0f11bd42c967
File name: 75549b60e1e585bb98ab562486576eae
Detection ratio: 0 / 60
Analysis date: 2018-01-28 20:48:11 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20180128
AegisLab 20180128
AhnLab-V3 20180128
Alibaba 20180126
ALYac 20180127
Antiy-AVL 20180128
Arcabit 20180128
Avast 20180128
Avast-Mobile 20180128
AVG 20180128
Avira (no cloud) 20180128
AVware 20180124
Baidu 20180126
BitDefender 20180128
Bkav 20180126
CAT-QuickHeal 20180127
ClamAV 20180128
CMC 20180128
Comodo 20180128
CrowdStrike Falcon (ML) 20171016
Cybereason None
Cyren 20180128
DrWeb 20180128
eGambit 20180128
Emsisoft 20180128
Endgame 20171130
ESET-NOD32 20180128
F-Prot 20180128
F-Secure 20180128
Fortinet 20180128
GData 20180128
Sophos ML 20180121
Jiangmin 20180128
K7AntiVirus 20180128
K7GW 20180128
Kaspersky 20180128
Kingsoft 20180128
Malwarebytes 20180128
MAX 20180128
McAfee 20180128
McAfee-GW-Edition 20180128
Microsoft 20180128
eScan 20180128
NANO-Antivirus 20180128
nProtect 20180128
Palo Alto Networks (Known Signatures) 20180128
Panda 20180128
Qihoo-360 20180128
Rising 20180128
SentinelOne (Static ML) 20180115
Sophos AV 20180128
SUPERAntiSpyware 20180128
Symantec 20180127
Symantec Mobile Insight 20180126
Tencent 20180128
TheHacker 20180125
TrendMicro 20180128
TrendMicro-HouseCall 20180128
Trustlook 20180128
VBA32 20180126
VIPRE 20180128
ViRobot 20180128
Webroot 20180128
Yandex 20180112
Zillya 20180126
ZoneAlarm by Check Point 20180128
Zoner 20180128
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.unnyhog.unnyworld2. The internal version number of the application is 86. The displayed version string of the application is 1.2.3. The minimum Android API level for the application to run (MinSDKVersion) is 19. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
Activities
com.unity3d.player.UnityPlayerActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityAppLinkActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.facebook.unity.FBUnityGameRequestActivity
com.facebook.unity.FBUnityCreateGameGroupActivity
com.facebook.unity.FBUnityJoinGameGroupActivity
com.facebook.unity.AppInviteDialogActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.facebook.CustomTabMainActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.unity.purchasing.googleplay.VRPurchaseActivity
com.google.games.bridge.NativeBridgeActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.unnyworld.android.gcm.MyInstanceIDListenerService
com.google.android.gms.auth.api.signin.RevocationBoundService
Receivers
com.unnyworld.android.notifications.UnityNotificationManager
com.amazon.device.iap.ResponseReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
Providers
com.facebook.FacebookContentProvider
Service-related intent filters
com.unnyworld.android.gcm.MyInstanceIDListenerService
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
com.unity.purchasing.googleplay.VRPurchaseActivity
actions: com.google.vr.vrcore.ACTION_NONE
categories: com.google.intent.category.DAYDREAM
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2449
Uncompressed size
59886097
Highest datetime
2018-01-21 22:00:02
Lowest datetime
2018-01-21 21:59:48
Contained files by type
unknown
1000
File identification
MD5 75549b60e1e585bb98ab562486576eae
SHA1 1de35d362f8055ef6477374fce62dc0d56f2f4f5
SHA256 69aa3dbfdc2b4c356d3eb7f2bcbbb8b003e4973fff7db79db63e0f11bd42c967
ssdeep
1572864:20NAIMfIoso/uOzF29bNs6w9eAuHp9+Rb5tlmAP+GM:pA7fIgpIbNYej9+Rbzlmp

File size 63.9 MB ( 66982516 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk android

VirusTotal metadata
First submission 2018-01-28 20:48:11 UTC ( 1 year, 3 months ago )
Last submission 2018-01-28 20:48:11 UTC ( 1 year, 3 months ago )
File names 75549b60e1e585bb98ab562486576eae
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!