× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 75576c09d5fa64b845946949b3e024796a847b1a7c6336ceaccd5b4515757ea3
File name: 3e2e8a65ae1e297086c21a591aab5aa4
Detection ratio: 0 / 62
Analysis date: 2017-12-09 05:31:23 UTC ( 1 year, 2 months ago )
Antivirus Result Update
Ad-Aware 20171209
AegisLab 20171209
AhnLab-V3 20171208
Alibaba 20171208
ALYac 20171208
Antiy-AVL 20171209
Arcabit 20171209
Avast 20171209
Avast-Mobile 20171208
AVG 20171209
Avira (no cloud) 20171209
AVware 20171209
Baidu 20171209
BitDefender 20171209
Bkav 20171208
CAT-QuickHeal 20171208
ClamAV 20171208
CMC 20171208
Comodo 20171209
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171209
Cyren 20171209
DrWeb 20171209
eGambit 20171209
Emsisoft 20171209
Endgame 20171130
ESET-NOD32 20171209
F-Prot 20171209
F-Secure 20171209
Fortinet 20171209
GData 20171209
Ikarus 20171208
Sophos ML 20170914
Jiangmin 20171209
K7AntiVirus 20171208
K7GW 20171209
Kaspersky 20171209
Kingsoft 20171209
Malwarebytes 20171209
MAX 20171209
McAfee 20171209
McAfee-GW-Edition 20171209
Microsoft 20171209
eScan 20171209
NANO-Antivirus 20171209
nProtect 20171209
Palo Alto Networks (Known Signatures) 20171209
Panda 20171208
Qihoo-360 20171209
Rising 20171209
SentinelOne (Static ML) 20171207
Sophos AV 20171209
SUPERAntiSpyware 20171209
Symantec 20171209
Symantec Mobile Insight 20171207
Tencent 20171209
TheHacker 20171205
TotalDefense 20171208
TrendMicro 20171209
TrendMicro-HouseCall 20171209
Trustlook 20171209
VBA32 20171208
VIPRE 20171209
ViRobot 20171209
Webroot 20171209
WhiteArmor 20171204
Yandex 20171208
ZoneAlarm by Check Point 20171209
Zoner 20171209
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.avarmmg.net.drawandspin. The internal version number of the application is 14. The displayed version string of the application is 7.02. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.VIBRATE (control vibrator)
com.avarmmg.net.drawandspin.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
com.avarmmg.net.drawandspin.SplashScreen
com.avarmmg.net.drawandspin.MenuWave
com.avarmmg.net.drawandspin.SpinnerActivityGlow
com.avarmmg.net.drawandspin.RateActivity
com.avarmmg.net.drawandspin.SpinActivity
com.avarmmg.net.drawandspin.DrawActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.measurement.AppMeasurementService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.avarmmg.net.drawandspin.SplashScreen
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.avarmmg.net.drawandspin
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
623
Uncompressed size
10105249
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
428
xml
183
ogg
2
dex
1
MF
1
RSA
1
ttf
1
mp3
1
wav
1
SF
1
Contained files by type
PNG
428
XML
182
unknown
9
OGG
2
DEX
1
MP3
1
File identification
MD5 3e2e8a65ae1e297086c21a591aab5aa4
SHA1 5e5549148c47f3079ce9281d659b0a6ad9a00d92
SHA256 75576c09d5fa64b845946949b3e024796a847b1a7c6336ceaccd5b4515757ea3
ssdeep
98304:qnh4W7msUUWZW/KdGlUymd4XB0YXVxr42Pmih+Ak0d0uxQ4Mw6gw8vMx:ehF7WZWSMEdMBrxMLih+AkDuh6gJkx

File size 5.7 MB ( 5976272 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-12-09 05:31:23 UTC ( 1 year, 2 months ago )
Last submission 2017-12-09 05:31:23 UTC ( 1 year, 2 months ago )
File names 3e2e8a65ae1e297086c21a591aab5aa4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!