× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 83dd2087dd833acc332351c71cb387870208d1059fa49d37e9e9cba8893a30c5
File name: ipnossoft.rma.free.apk
Detection ratio: 0 / 55
Analysis date: 2016-08-06 16:29:52 UTC ( 2 years, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160806
AegisLab 20160806
AhnLab-V3 20160806
Alibaba 20160805
ALYac 20160806
Antiy-AVL 20160806
Arcabit 20160806
Avast 20160806
AVG 20160806
Avira (no cloud) 20160806
AVware 20160806
Baidu 20160806
BitDefender 20160806
Bkav 20160806
CAT-QuickHeal 20160806
ClamAV 20160806
CMC 20160804
Comodo 20160806
Cyren 20160806
DrWeb 20160806
Emsisoft 20160806
ESET-NOD32 20160806
F-Prot 20160806
F-Secure 20160806
Fortinet 20160806
GData 20160806
Ikarus 20160806
Jiangmin 20160806
K7AntiVirus 20160806
K7GW 20160806
Kaspersky 20160806
Kingsoft 20160806
Malwarebytes 20160806
McAfee 20160806
McAfee-GW-Edition 20160806
Microsoft 20160806
eScan 20160806
NANO-Antivirus 20160806
nProtect 20160805
Panda 20160806
Qihoo-360 20160806
Sophos AV 20160806
SUPERAntiSpyware 20160806
Symantec 20160806
Tencent 20160806
TheHacker 20160806
TotalDefense 20160805
TrendMicro 20160806
TrendMicro-HouseCall 20160806
VBA32 20160805
VIPRE 20160806
ViRobot 20160806
Yandex 20160805
Zillya 20160806
Zoner 20160806
The file being studied is Android related! APK Android file more specifically. The application's main package name is ipnossoft.rma.free. The internal version number of the application is 18. The displayed version string of the application is 3.2. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
ipnossoft.rma.RelaxMelodiesActivityFree
ipnossoft.rma.beats.BeatsActivity
ipnossoft.rma.web.WebViewActivity
ipnossoft.rma.AdWebViewActivity
ipnossoft.rma.web.NewsActivity
ipnossoft.rma.web.MoreProductActivity
ipnossoft.rma.preferences.ActionBarPreferenceActivity
ipnossoft.rma.UpgradeActivity
com.google.android.gms.ads.AdActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.millennialmedia.android.MMActivity
com.facebook.ads.InterstitialAdActivity
Services
ipnossoft.rma.SoundManager
Activity-related intent filters
ipnossoft.rma.RelaxMelodiesActivityFree
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1114
Uncompressed size
45775864
Highest datetime
2014-11-24 11:46:40
Lowest datetime
2014-11-21 13:41:20
Contained files by extension
png
666
xml
219
ogg
108
jpg
6
Contained files by type
PNG
666
XML
219
OGG
108
JPG
6
unknown
1
File identification
MD5 aec539d0102303966b5e441ad96ebaf8
SHA1 85f7191386a67136808e33f92f75e37b834f2ffd
SHA256 83dd2087dd833acc332351c71cb387870208d1059fa49d37e9e9cba8893a30c5
ssdeep
786432:rmOeD5SzhnqWrp6xP+WT0kbehxZ5tXrf68tGeijAOnC6YKP40tDYyaaZx7uIN:heFSNnVrUx2WwhxZ5BriLeRufP//h

File size 47.2 MB ( 49537967 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk checks-gps android software-collection

VirusTotal metadata
First submission 2014-12-06 09:50:07 UTC ( 4 years, 3 months ago )
Last submission 2018-07-24 16:41:56 UTC ( 7 months, 3 weeks ago )
File names 3ed3afa07f57dc2b24038d03855ba710
ipnossoft.rma.free_3.2.apk
83dd2087dd833acc332351c71cb387870208d1059fa49d37e9e9cba8893a30c5.vir
ipnossoft.rma.free-1.apk
relax-melodies.apk
ipnossoft.rma.free.apk
Relax_melodies_3.2.apk
relax-melodies-sleep-yoga.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.USER_PRESENT
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/ipnossoft.rma.free/files
/data/data/ipnossoft.rma.free/files/.flurryagent.-25d6dbb0
/data/data/ipnossoft.rma.free/files/.flurrydatasenderblock.67c5eba5-95cb-43c5-be1c-b26ebb02d367
/data/data/ipnossoft.rma.free/files/.FlurrySenderIndex.info.AnalyticsData_6275HF4WV8Z93GMBHPJM_172
/data/data/ipnossoft.rma.free/files/.FlurrySenderIndex.info.AnalyticsMain
/data/data/ipnossoft.rma.free/files/.flurryinstallreceiver.
Accessed files
/data/data/ipnossoft.rma.free/files/.flurryagent.-25d6dbb0
/data/data/ipnossoft.rma.free/files/.flurryinstallreceiver.
/data/data/ipnossoft.rma.free/files/.FlurrySenderIndex.info.AnalyticsMain
/data/data/ipnossoft.rma.free/files/.FlurrySenderIndex.info.AdsMain
/data/data/ipnossoft.rma.free/files/.flurryadlog.-25d6dbb0
/data/data/ipnossoft.rma.free/files/.flurryfreqcap.-25d6dbb0
/data/data/ipnossoft.rma.free/files/.flurrydatasenderblock.67c5eba5-95cb-43c5-be1c-b26ebb02d367
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Contacted URLs
http://ads.mopub.com/m/ad/v=6&id=agltb3B1Yi1pbmNyDQsSBFNpdGUY6t_rFAw&nv=3.2.2&dn=samsung,Nexus S,soju&udid=sha:7d33cbc1330492295694f090a90375333e8e19e1&z=+0200&o=p&sc_a=1.5&mr=1&mcc=310&mnc=260&iso=us&cn=Android&ct=3&av=3.2&android_perms_ext_storage=1
https://data.flurry.com/aap.do
Accessed URIs
twitter://timeline
market://details?id=ipnossoft.rma.free