× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 7ed1cf338c01d532057f2f6ba1c9e518d57a068cb116daa6165421706921a685
File name: 1441929725_alien-creeps_1.9.0.apk
Detection ratio: 0 / 55
Analysis date: 2016-08-07 01:35:36 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160807
AegisLab 20160806
AhnLab-V3 20160806
Alibaba 20160805
ALYac 20160806
Antiy-AVL 20160807
Arcabit 20160807
Avast 20160807
AVG 20160807
Avira (no cloud) 20160806
AVware 20160806
Baidu 20160806
BitDefender 20160807
Bkav 20160806
CAT-QuickHeal 20160806
ClamAV 20160807
CMC 20160804
Comodo 20160806
Cyren 20160807
DrWeb 20160807
Emsisoft 20160807
ESET-NOD32 20160806
F-Prot 20160807
F-Secure 20160807
Fortinet 20160807
GData 20160807
Ikarus 20160806
Jiangmin 20160806
K7AntiVirus 20160806
K7GW 20160807
Kaspersky 20160806
Kingsoft 20160807
Malwarebytes 20160806
McAfee 20160807
McAfee-GW-Edition 20160807
Microsoft 20160806
eScan 20160807
NANO-Antivirus 20160806
nProtect 20160805
Panda 20160806
Qihoo-360 20160807
Sophos AV 20160807
SUPERAntiSpyware 20160806
Symantec 20160807
Tencent 20160807
TheHacker 20160806
TotalDefense 20160805
TrendMicro 20160807
TrendMicro-HouseCall 20160807
VBA32 20160805
VIPRE 20160806
ViRobot 20160806
Yandex 20160806
Zillya 20160806
Zoner 20160807
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.outplayentertainment.aliencreeps. The internal version number of the application is 10090000. The displayed version string of the application is 1.9.0. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
com.outplayentertainment.aliencreeps.permission.C2D_MESSAGE (C2DM permission.)
Activities
com.vungle.publisher.FullScreenAdActivity
com.outplayentertainment.aliencreeps.AlienCreepsActivity
com.facebook.FacebookActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
Services
com.vungle.publisher.VungleService
com.outplayentertainment.cocoskit.localnotification.LocalNotificationPosterService
Receivers
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
com.outplayentertainment.ogk.InstallReceiver
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
Activity-related intent filters
com.outplayentertainment.aliencreeps.AlienCreepsActivity
actions: android.intent.action.MAIN, com.facebook.SSO_WITH_FALLBACK, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.outplayentertainment.cocoskit.services.connectivity.ConnectivityService
actions: android.net.conn.CONNECTIVITY_CHANGE
com.outplayentertainment.cocoskit.services.gcm.GCMReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.outplayentertainment.aliencreeps
com.outplayentertainment.ogk.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
856
Uncompressed size
71633868
Highest datetime
2015-08-25 09:18:02
Lowest datetime
2015-08-14 11:37:10
Contained files by extension
png
294
map
75
xml
54
tsv
20
m4a
8
fnt
4
bin
2
so
2
txt
2
ckb
1
RSA
1
dex
1
MF
1
SF
1
css
1
Contained files by type
PNG
294
unknown
281
XML
188
JSON
86
HTML
4
ELF
2
DEX
1
File identification
MD5 0db91c211f1e394003e17d71a0809ef3
SHA1 19b7c2f4a4c8f71f32800463725bd9d959adb94d
SHA256 7ed1cf338c01d532057f2f6ba1c9e518d57a068cb116daa6165421706921a685
ssdeep
786432:ITotz3t75HI9JNtav6EtiZtlOLZTcukaA7FBiTzcC1v4LL9uV4lp8szfQZQuZ:Jz3t7dI9DtayBtq6T7ziTzF1vUxuV4lW

File size 39.8 MB ( 41753484 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-08-27 10:46:47 UTC ( 3 years, 4 months ago )
Last submission 2016-10-12 05:55:06 UTC ( 2 years, 3 months ago )
File names base.apk
1441929725_alien-creeps_1.9.0.apk
alien-creeps-td.apk
1443510570_com.outplayentertainment.aliencreeps.apk
com.outplayentertainment.aliencreeps.apk
474210_77b62c_com.outplayentertainment.aliencreeps.apk
1441929725_alien-creeps_1.9.0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=com.google.android.c2dm.intent.REGISTER;package=com.google.android.gms;S.sender=783404936065;end
Opened files
/data/data/com.outplayentertainment.aliencreeps/files/AdjustAttribution
/data/data/com.outplayentertainment.aliencreeps/files/AdjustIoActivityState
/data/data/com.outplayentertainment.aliencreeps/files/AdjustIoPackageQueue
/data/data/com.outplayentertainment.aliencreeps/files/AppEventsLogger.persistedevents
/data/data/com.outplayentertainment.aliencreeps/files/AppEventsLogger.persistedsessioninfo
/sys/devices/system/cpu
/data/data/com.outplayentertainment.aliencreeps/files
/mnt/sdcard
Deleted files
/data/data/com.outplayentertainment.aliencreeps/filesAppEventsLogger.persistedsessioninfo
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
https://app.adjust.com/session
73637265656E5F666F726D61743D6C6F6E67266465766963655F6D616E7566616374757265723D73616D73756E672673657373696F6E5F636F756E743D31266465766963655F747970653D70686F6E652673637265656E5F73697A653D6E6F726D616C267061636B6167655F6E616D653D636F6D2E6F7574706C6179656E7465727461696E6D656E742E616C69656E637265657073266170705F76657273696F6E3D312E392E3026616E64726F69645F757569643D66626236643266652D646330342D343264632D623138392D333931366236363635353737266D61635F6D64353D643431636463666365386437373937383063653066393866396336313836...
https://app.adjust.com/attribution/needs_attribution_data=1&app_token=3hn2wew48jgy&android_id=6bfb4e3d818505b5&mac_sha1=2bd5ac73a1299461decd4503ed1eec89d2f27436&environment=production&android_uuid=fbb6d2fe-dc04-42dc-b189-3916b6665577&mac_md5=d41cdcfce8d779780ce0f98f9c618612
https://graph.facebook.com/v2.3/568793059903593?format=json&sdk=android&fields=supports_implicit_sdk_logging%2Cgdpv4_nux_content%2Cgdpv4_nux_enabled%2Candroid_dialog_configs%2Candroid_sdk_error_categories
https://graph.facebook.com/v2.3/568793059903593/activities?format=json&sdk=android
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
content://com.facebook.katana.provider.PlatformProvider/versions
content://com.facebook.wakizashi.provider.PlatformProvider/versions