× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 863b20c13418cf1bfc63cf2ccae4a93b0fb6f29cc629dfff9937a01510bad4ae
File name: red-ball-4.apk
Detection ratio: 0 / 54
Analysis date: 2015-11-12 01:53:51 UTC ( 3 years, 3 months ago ) View latest
Antivirus Result Update
AegisLab 20151111
Yandex 20151111
AhnLab-V3 20151111
Alibaba 20151111
Antiy-AVL 20151111
Arcabit 20151111
Avast 20151111
AVG 20151111
Avira (no cloud) 20151111
AVware 20151111
Baidu-International 20151111
BitDefender 20151111
Bkav 20151110
ByteHero 20151112
CAT-QuickHeal 20151110
ClamAV 20151111
CMC 20151109
Comodo 20151111
Cyren 20151111
DrWeb 20151111
Emsisoft 20151111
ESET-NOD32 20151112
F-Prot 20151111
F-Secure 20151111
Fortinet 20151111
GData 20151111
Ikarus 20151111
Jiangmin 20151111
K7AntiVirus 20151111
K7GW 20151111
Kaspersky 20151111
Malwarebytes 20151111
McAfee 20151111
McAfee-GW-Edition 20151112
Microsoft 20151112
eScan 20151112
NANO-Antivirus 20151112
nProtect 20151111
Panda 20151111
Qihoo-360 20151112
Rising 20151111
Sophos AV 20151112
SUPERAntiSpyware 20151111
Symantec 20151111
Tencent 20151112
TheHacker 20151110
TotalDefense 20151111
TrendMicro 20151112
TrendMicro-HouseCall 20151112
VBA32 20151111
VIPRE 20151112
ViRobot 20151112
Zillya 20151111
Zoner 20151111
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.FDGEntertainment.redball4.gp. The internal version number of the application is 91. The displayed version string of the application is 1.0.91. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.FDGEntertainment.redball4.gp.RedBall4
com.FDGEntertainment.redball4.gp.Cocos2dxVideo
com.soomla.store.billing.google.GooglePlayIabService$IabActivity
com.vungle.publisher.FullScreenAdActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.google.android.gms.ads.AdActivity
com.playhaven.android.view.FullScreen
Services
com.vungle.publisher.VungleService
Receivers
com.FDGEntertainment.redball4.gp.LocalNotificationReceiver
Activity-related intent filters
com.FDGEntertainment.redball4.gp.RedBall4
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.playhaven.android.view.FullScreen
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
487
Uncompressed size
59505434
Highest datetime
2015-02-24 17:50:06
Lowest datetime
2013-12-01 00:31:22
Contained files by extension
png
226
xml
67
ogg
50
jar
13
fnt
2
mp4
2
so
2
dex
1
RSA
1
SF
1
MF
1
ttf
1
Contained files by type
PNG
226
XML
124
unknown
71
OGG
50
ZIP
13
ELF
2
DEX
1
File identification
MD5 84ee71d2e74ad2cbe21db2c90d1d7a8e
SHA1 f33badb578efabbca4e0013704e989aee41993f7
SHA256 863b20c13418cf1bfc63cf2ccae4a93b0fb6f29cc629dfff9937a01510bad4ae
ssdeep
786432:SMdqtoBrRZ97uN8kxTNKZDdaXnI6/ILG4tOSMOP4wKPd04o34EBrs50a0Y:7duoB97uWkNhXnI6/vrHOG0fWv7

File size 46.4 MB ( 48666378 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android software-collection contains-elf

VirusTotal metadata
First submission 2015-02-25 08:24:09 UTC ( 3 years, 11 months ago )
Last submission 2016-06-16 12:59:33 UTC ( 2 years, 8 months ago )
File names red-ball-4.apk
Red_Ball4.apk
red-ball-4.apk
com.FDGEntertainment.redball4.gp-1.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.FDGEntertainment.redball4.gp/cache/volley
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBRequestManager
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBTrackingDirectory
/mnt/sdcard/Android/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBVideoDirectory
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBVideoCompletion
/data/data/com.FDGEntertainment.redball4.gp/files
Accessed files
/data/data/com.FDGEntertainment.redball4.gp/files
/data/data/com.FDGEntertainment.redball4.gp/cache/volley
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBRequestManager
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBTrackingDirectory
/mnt/sdcard/Android/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBVideoDirectory
/data/data/com.FDGEntertainment.redball4.gp/cache/__chartboost/CBVideoCompletion
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
https://live.chartboost.com/api/video-prefetch
https://sdk-api-ssl.playhaven.com/v3/publisher/open/
Accessed URIs
https://live.chartboost.com/api/video-prefetch