× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6c50b6cd58b73de9d5730dcc2aaf0f4c41d97d87c8f709b25136e8ce86ad7072
File name: 815562_37fa9a_com.cherrypickgames.mustdeliver-25.apk
Detection ratio: 0 / 64
Analysis date: 2017-10-27 20:34:18 UTC ( 1 year, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20171027
AegisLab 20171027
AhnLab-V3 20171027
Alibaba 20170911
ALYac 20171027
Antiy-AVL 20171027
Arcabit 20171027
Avast 20171027
Avast-Mobile 20171027
AVG 20171027
Avira (no cloud) 20171027
AVware 20171027
Baidu 20171027
BitDefender 20171027
Bkav 20171027
CAT-QuickHeal 20171027
ClamAV 20171027
CMC 20171027
Comodo 20171027
CrowdStrike Falcon (ML) 20171016
Cybereason None
Cylance 20171027
Cyren 20171027
DrWeb 20171027
eGambit 20171027
Emsisoft 20171027
Endgame 20171024
ESET-NOD32 20171027
F-Prot 20171027
F-Secure 20171027
Fortinet 20171027
GData 20171027
Ikarus 20171027
Sophos ML 20170914
Jiangmin 20171027
K7AntiVirus 20171027
K7GW 20171027
Kaspersky 20171027
Kingsoft 20171027
Malwarebytes 20171027
MAX 20171027
McAfee 20171027
McAfee-GW-Edition 20171027
Microsoft 20171027
eScan 20171027
NANO-Antivirus 20171027
nProtect 20171027
Palo Alto Networks (Known Signatures) 20171027
Panda 20171027
Qihoo-360 20171027
Rising 20171027
SentinelOne (Static ML) 20171019
Sophos AV 20171027
SUPERAntiSpyware 20171027
Symantec 20171027
Symantec Mobile Insight 20171027
Tencent 20171027
TheHacker 20171024
TotalDefense 20171027
TrendMicro 20171027
TrendMicro-HouseCall 20171027
Trustlook 20171027
VBA32 20171027
VIPRE 20171027
ViRobot 20171027
Webroot 20171027
WhiteArmor 20171024
Yandex 20171027
Zillya 20171027
ZoneAlarm by Check Point 20171027
Zoner 20171027
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.cherrypickgames.mustdeliver. The internal version number of the application is 25. The displayed version string of the application is 1.7.0. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.apptracker.android.module.AppModuleActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.heyzap.sdk.ads.HeyzapProxyActivity
com.heyzap.sdk.ads.VASTActivity
com.unity3d.player.UnityPlayerProxyActivity
com.outlinegames.unibill.PurchaseActivity
com.heyzap.sdk.ads.MediationTestActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.vungle.publisher.FullScreenAdActivity
Services
com.vungle.publisher.VungleService
com.CFM.ELAN.ELANAlarmCreator
Receivers
com.heyzap.sdk.ads.PackageAddedReceiver
com.CFM.ELAN.TimedAlarm
Activity-related intent filters
com.unity3d.player.UnityPlayerProxyActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
915
Uncompressed size
114639136
Highest datetime
2017-03-13 11:27:50
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
156
xml
26
dll
22
so
5
dex
1
MF
1
RSA
1
wav
1
SF
1
Contained files by type
unknown
705
PNG
156
XML
26
Portable Executable
22
ELF
5
DEX
1
File identification
MD5 4bbbe0a6d1a1dabc4c282456891054e6
SHA1 32ce4ad7289f50e631977e109f9ebb19ab7c42b8
SHA256 6c50b6cd58b73de9d5730dcc2aaf0f4c41d97d87c8f709b25136e8ce86ad7072
ssdeep
786432:dA3LANHM82avGGrws40/SK/wIJn3oq8kUy:6MNb2avGGrg0VV3oqlUy

File size 27.1 MB ( 28468199 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-03-14 17:15:20 UTC ( 2 years ago )
Last submission 2019-02-28 14:44:58 UTC ( 3 weeks ago )
File names com.cherrypickgames.mustdeliver.apk
com.cherrypickgames.mustdeliver.apk
must-deliver-1.7.0.apk
APKupdate_com_cherrypickgames_mustdeliver-25.apk
815562_37fa9a_com.cherrypickgames.mustdeliver-25.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.cherrypickgames.mustdeliver-1.apk/assets/bin/Data/settings.xml