× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 73102028d4270fcf252e16813d619c03e22824e5540ba828fdb2292cf66d880e
File name: 2268-aa40c0e527bc6e17cbe6ddeb97d319a7-1458897304.apk
Detection ratio: 0 / 57
Analysis date: 2016-04-19 06:50:09 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160419
AegisLab 20160419
AhnLab-V3 20160419
Alibaba 20160419
ALYac 20160419
Antiy-AVL 20160419
Arcabit 20160419
Avast 20160419
AVG 20160419
Avira (no cloud) 20160419
AVware 20160419
Baidu 20160418
Baidu-International 20160418
BitDefender 20160419
Bkav 20160415
CAT-QuickHeal 20160419
ClamAV 20160419
CMC 20160415
Comodo 20160418
Cyren 20160419
DrWeb 20160419
Emsisoft 20160419
ESET-NOD32 20160419
F-Prot 20160419
F-Secure 20160419
Fortinet 20160419
GData 20160419
Ikarus 20160418
Jiangmin 20160419
K7AntiVirus 20160418
K7GW 20160419
Kaspersky 20160419
Kingsoft 20160419
Malwarebytes 20160419
McAfee 20160419
McAfee-GW-Edition 20160419
Microsoft 20160419
eScan 20160419
NANO-Antivirus 20160419
nProtect 20160418
Panda 20160417
Qihoo-360 20160419
Rising 20160419
Sophos AV 20160419
SUPERAntiSpyware 20160419
Symantec 20160419
Tencent 20160419
TheHacker 20160419
TotalDefense 20160419
TrendMicro 20160419
TrendMicro-HouseCall 20160419
VBA32 20160418
VIPRE 20160419
ViRobot 20160419
Yandex 20160416
Zillya 20160418
Zoner 20160419
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.outplayentertainment.aliencreeps. The internal version number of the application is 20200001. The displayed version string of the application is 2.2.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
com.outplayentertainment.aliencreeps.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.vungle.publisher.FullScreenAdActivity
com.outplayentertainment.aliencreeps.AlienCreepsActivity
com.facebook.FacebookActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.zendesk.sdk.feedback.ui.ContactZendeskActivity
com.zendesk.sdk.requests.ViewRequestActivity
com.zendesk.sdk.requests.RequestActivity
com.zendesk.sdk.support.SupportActivity
com.zendesk.sdk.support.ViewArticleActivity
Services
com.google.android.gms.analytics.CampaignTrackingService
com.outplayentertainment.cocoskit.localnotification.LocalNotificationPosterService
com.google.android.gms.measurement.AppMeasurementService
Receivers
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
com.outplayentertainment.ogk.InstallReceiver
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
com.zendesk.sdk.power.BatteryStateBroadcastReceiver
com.zendesk.sdk.deeplinking.ZendeskDeepLinkingBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
Providers
com.zendesk.belvedere.BelvedereFileProvider
com.google.android.gms.measurement.AppMeasurementContentProvider
Activity-related intent filters
com.outplayentertainment.aliencreeps.AlienCreepsActivity
actions: android.intent.action.MAIN, com.facebook.SSO_WITH_FALLBACK, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.outplayentertainment.aliencreeps
com.google.android.gms.measurement.AppMeasurementReceiver
actions: com.google.android.gms.measurement.UPLOAD
com.zendesk.sdk.power.BatteryStateBroadcastReceiver
actions: android.intent.action.BATTERY_LOW, android.intent.action.BATTERY_OKAY
com.zendesk.sdk.deeplinking.ZendeskDeepLinkingBroadcastReceiver
actions: com.zendesk.sdk.deeplinking
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
actions: android.net.conn.CONNECTIVITY_CHANGE
com.outplayentertainment.ogk.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2049
Uncompressed size
71073755
Highest datetime
2016-03-16 18:52:30
Lowest datetime
2016-03-16 18:50:04
Contained files by extension
map
169
png
79
fnt
17
m4a
8
bin
2
jpg
2
xml
1
ckb
1
Contained files by type
unknown
648
XML
158
JSON
113
PNG
79
JPG
2
File identification
MD5 aa40c0e527bc6e17cbe6ddeb97d319a7
SHA1 2acc908ffa796fca3496f3631c4e6be103430397
SHA256 73102028d4270fcf252e16813d619c03e22824e5540ba828fdb2292cf66d880e
ssdeep
1572864:0qf1u1JwE/18sLxgGcMWumnRlWxSxPSMSDeP7Q9CKaox/2gOEGoCxEDoE:0m0nz/aMhOvDFSM6ek9zflFOXQ

File size 76.6 MB ( 80318324 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-03-17 17:33:54 UTC ( 2 years, 10 months ago )
Last submission 2016-10-12 05:57:05 UTC ( 2 years, 3 months ago )
File names alien-creeps-td.apk
com.outplayentertainment.aliencreeps-4.apk
2268-aa40c0e527bc6e17cbe6ddeb97d319a7-1458897304.apk
2268-aa40c0e527bc6e17cbe6ddeb97d319a7-1458897304.apk
com.outplayentertainment.aliencreeps-1.apk
alien-creeps-td-2.2.0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!