× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 754fbf78a6105f477f250b6c73b0f59e4c27acfad40b3ca318114bd2ae454822
File name: 532715_652b75_net.elvista.checkers-64.apk
Detection ratio: 0 / 57
Analysis date: 2016-04-13 21:06:06 UTC ( 2 years, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160413
AegisLab 20160413
AhnLab-V3 20160413
Alibaba 20160413
ALYac 20160413
Antiy-AVL 20160413
Arcabit 20160413
Avast 20160413
AVG 20160413
Avira (no cloud) 20160413
AVware 20160413
Baidu 20160413
Baidu-International 20160413
BitDefender 20160413
Bkav 20160413
CAT-QuickHeal 20160413
ClamAV 20160412
CMC 20160412
Comodo 20160413
Cyren 20160413
DrWeb 20160413
Emsisoft 20160413
ESET-NOD32 20160413
F-Prot 20160413
F-Secure 20160413
Fortinet 20160404
GData 20160413
Ikarus 20160413
Jiangmin 20160413
K7AntiVirus 20160413
K7GW 20160404
Kaspersky 20160413
Kingsoft 20160413
Malwarebytes 20160413
McAfee 20160413
McAfee-GW-Edition 20160413
Microsoft 20160413
eScan 20160413
NANO-Antivirus 20160413
nProtect 20160412
Panda 20160413
Qihoo-360 20160413
Rising 20160413
Sophos AV 20160413
SUPERAntiSpyware 20160413
Symantec 20160413
Tencent 20160413
TheHacker 20160412
TotalDefense 20160413
TrendMicro 20160413
TrendMicro-HouseCall 20160413
VBA32 20160413
VIPRE 20160413
ViRobot 20160413
Yandex 20160412
Zillya 20160413
Zoner 20160413
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.elvista.checkers. The internal version number of the application is 64. The displayed version string of the application is 2.1.5. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
net.elvista.checkers.permission.C2D_MESSAGE (C2DM permission.)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.ansca.corona.CoronaActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.purplebrain.adbuddiz.sdk.AdBuddizActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.InterstitialAdActivity
com.chartboost.sdk.CBImpressionActivity
com.vungle.sdk.VungleAdvert
com.apptracker.android.module.AppModuleActivity
com.fusepowered.nx.monetization.activities.InterstitialActivity
com.fusepowered.nx.videoplayer.VideoActivity
com.google.android.gms.ads.AdActivity
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
com.fusepowered.m2.mobileads.M2Activity
com.fusepowered.m2.mobileads.M2RActivity
com.fusepowered.m2.common.M2Browser
com.fusepowered.m2.mobileads.M2RvpActivity
com.fusepowered.m1.android.MMActivity
com.fusepowered.m1.android.VideoPlayer
com.fusepowered.u1.U1InterstitialActivity
com.fusepowered.ads.adapters.FuseInterstitialActivity
com.fusepowered.l1.AdActivity
com.fusepowered.l1.AdBrowserActivity
com.fusepowered.l1.PlayerActivity
com.fusepowered.ac.ACOActivity
com.fusepowered.ac.ACFActivity
com.fusepowered.ac.ACBActivity
com.fusepowered.ads.adapters.LRActivity
com.fusepowered.ads.adapters.MRaidActivity
com.fusepowered.ads.adapters.MRaidVideoActivity
com.fusepowered.sa.android.publish.list3d.List3DActivity
com.fusepowered.sa.android.publish.AppWallActivity
com.fusepowered.as.view.ASVastInterstitialActivity
com.fusepowered.as.view.ASWebviewInterstitialActivity
com.fusepowered.ap.MainActivity
com.fusepowered.ap.BrowserActivity
com.fusepowered.ap.VDActivity
com.fusepowered.al.adview.ALInterstitialActivity
com.fusepowered.al.adview.ALConfirmationActivity
com.fusepowered.ads.adapters.ALActivity
com.fusepowered.im.androidsdk.IMBrowserActivity
com.fusepowered.ads.adapters.CBActivity
com.fusepowered.vast.activity.VASTActivity
Services
com.ansca.corona.CoronaService
com.vungle.sdk.VungleIntentService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
Providers
com.ansca.corona.storage.FileContentProvider
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
actions: com.fusepowered.fuseactivities.FuseApiMoregamesBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: net.elvista.checkers
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
715
Uncompressed size
39369051
Highest datetime
2015-12-13 21:27:40
Lowest datetime
2015-10-05 17:13:38
Contained files by extension
png
524
jpg
101
mp3
19
so
12
ttf
7
xml
1
dex
1
MF
1
car
1
db
1
RSA
1
SF
1
txt
1
Contained files by type
PNG
524
JPG
101
directory
41
MP3
19
unknown
15
ELF
12
XML
1
DEX
1
HTML
1
File identification
MD5 385245038c8b0cf721a40efb2faa5ea2
SHA1 26e569489489141987b7edf82a5c3fc1ad33df96
SHA256 754fbf78a6105f477f250b6c73b0f59e4c27acfad40b3ca318114bd2ae454822
ssdeep
393216:KRC0yVhi8dFsh7jTpxE30QNqj1lNTtok3PKol1HP9/kE9Jb++Of:rVsaFsV1S2zIk3PKoLHP9MKGf

File size 37.6 MB ( 39394390 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (56.7%)
Java Archive (15.6%)
BlueEyes Animation (14.5%)
Mozilla Archive Format (gen) (7.5%)
ZIP compressed archive (4.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-12-14 06:46:07 UTC ( 3 years, 3 months ago )
Last submission 2018-11-04 10:09:09 UTC ( 4 months, 3 weeks ago )
File names checkers-hd-2.1.5.apk
532715_652b75_net.elvista.checkers-64.apk
checkers-elite.apk
net.elvista.checkers-1.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!