× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7143b7a062de004c31a55238a0da867ecdbe6cde1f03b8ea9a18ae09892e0ab7
File name: asamBALko3BmFyit9YCs8g2XPik0xZNEghqAZsnb87P6zauB8umqtpFWgjvEm
Detection ratio: 0 / 62
Analysis date: 2018-08-15 16:16:06 UTC ( 8 months, 1 week ago )
Antivirus Result Update
Ad-Aware 20180815
AegisLab 20180815
AhnLab-V3 20180815
Alibaba 20180713
ALYac 20180815
Antiy-AVL 20180815
Arcabit 20180815
Avast 20180815
Avast-Mobile 20180815
AVG 20180815
Avira (no cloud) 20180815
AVware 20180815
Babable 20180725
Baidu 20180815
BitDefender 20180815
Bkav 20180815
CAT-QuickHeal 20180814
ClamAV 20180815
CMC 20180812
Comodo 20180815
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180815
Cyren 20180815
DrWeb 20180815
eGambit 20180815
Emsisoft 20180815
Endgame 20180730
ESET-NOD32 20180815
F-Prot 20180815
F-Secure 20180815
Fortinet 20180815
GData 20180815
Ikarus 20180815
Sophos ML 20180717
Jiangmin 20180815
K7AntiVirus 20180815
K7GW 20180815
Kaspersky 20180815
Kingsoft 20180815
Malwarebytes 20180815
MAX 20180815
McAfee 20180815
McAfee-GW-Edition 20180815
Microsoft 20180815
eScan 20180815
NANO-Antivirus 20180815
Palo Alto Networks (Known Signatures) 20180815
Panda 20180815
Qihoo-360 20180815
Rising 20180815
SentinelOne (Static ML) 20180701
Sophos AV 20180815
SUPERAntiSpyware 20180815
Symantec 20180815
Symantec Mobile Insight 20180814
TACHYON 20180815
Tencent 20180815
TheHacker 20180815
TotalDefense 20180815
TrendMicro 20180815
TrendMicro-HouseCall 20180815
Trustlook 20180815
VBA32 20180815
VIPRE 20180815
ViRobot 20180815
Webroot 20180815
Yandex 20180815
Zillya 20180815
ZoneAlarm by Check Point 20180815
Zoner 20180815
The file being studied is Android related! APK Android file more specifically. The application's main package name is game.bubble.shooter.dragon.pop. The internal version number of the application is 73. The displayed version string of the application is 73.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.READ_LOGS (read sensitive log data)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
game.bubble.shooter.dragon.pop.dr
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.FacebookActivity
com.facebook.ads.InterstitialAdActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.facebook.CustomTabMainActivity
com.google.android.gms.common.api.GoogleApiActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.vungle.publisher.FlexViewAdActivity
Receivers
a.a.a.c
a.a.a.d
Activity-related intent filters
game.bubble.shooter.dragon.pop.dr
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
a.a.a.d
actions: android.net.conn.CONNECTIVITY_CHANGE
a.a.a.c
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1350
Uncompressed size
45023940
Highest datetime
2018-08-07 21:58:32
Lowest datetime
1980-01-01 08:00:00
Contained files by extension
png
204
ogg
94
xml
67
so
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
632
PNG
204
OGG
94
XML
67
ELF
2
DEX
1
File identification
MD5 0a37e922ad7c4d5e93ef74bd510a9de6
SHA1 ed295aacd167401c910021326008470ab878873d
SHA256 7143b7a062de004c31a55238a0da867ecdbe6cde1f03b8ea9a18ae09892e0ab7
ssdeep
786432:vUs/Egg9H7J6TbRDCJTxeVj3N5UBBGD+cka0S/nEdLEM8lImo6u+2OAo6z:vTvg57J6xtVxeBBGacka0SPEdLAlIX62

File size 35.0 MB ( 36739948 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-08-15 16:16:06 UTC ( 8 months, 1 week ago )
Last submission 2018-08-15 16:16:06 UTC ( 8 months, 1 week ago )
File names asamBALko3BmFyit9YCs8g2XPik0xZNEghqAZsnb87P6zauB8umqtpFWgjvEm
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!