× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 86af645610a394bed295641a9fec2fe8ad81c733d9ca64b6574a2aad73cded81
File name: Block%20Puzzle%20Jewel.apk
Detection ratio: 0 / 63
Analysis date: 2018-08-06 06:53:08 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180806
AegisLab 20180806
AhnLab-V3 20180806
Alibaba 20180713
ALYac 20180806
Antiy-AVL 20180806
Arcabit 20180806
Avast 20180806
Avast-Mobile 20180806
AVG 20180806
Avira (no cloud) 20180806
AVware 20180727
Babable 20180725
Baidu 20180806
BitDefender 20180806
Bkav 20180803
CAT-QuickHeal 20180805
ClamAV 20180806
CMC 20180806
Comodo 20180806
CrowdStrike Falcon (ML) 20180723
Cybereason 20180308
Cylance 20180806
Cyren 20180806
DrWeb 20180806
eGambit 20180806
Emsisoft 20180806
Endgame 20180730
ESET-NOD32 20180806
F-Prot 20180806
F-Secure 20180806
Fortinet 20180806
GData 20180806
Ikarus 20180805
Sophos ML 20180717
Jiangmin 20180806
K7AntiVirus 20180806
K7GW 20180806
Kaspersky 20180806
Kingsoft 20180806
Malwarebytes 20180806
MAX 20180806
McAfee 20180806
McAfee-GW-Edition 20180806
Microsoft 20180805
eScan 20180806
NANO-Antivirus 20180806
Palo Alto Networks (Known Signatures) 20180806
Panda 20180805
Qihoo-360 20180806
Rising 20180806
SentinelOne (Static ML) 20180701
Sophos AV 20180806
SUPERAntiSpyware 20180806
Symantec 20180806
Symantec Mobile Insight 20180801
TACHYON 20180806
Tencent 20180806
TheHacker 20180805
TotalDefense 20180806
TrendMicro 20180806
TrendMicro-HouseCall 20180806
Trustlook 20180806
VBA32 20180803
VIPRE 20180806
ViRobot 20180806
Webroot 20180806
Yandex 20180805
Zillya 20180803
ZoneAlarm by Check Point 20180806
Zoner 20180806
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.differencetenderwhite.skirt. The internal version number of the application is 37. The displayed version string of the application is 37.0. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.READ_LOGS (read sensitive log data)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
org.cocos2dx.cpp.AppActivity
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.AudienceNetworkActivity
com.facebook.FacebookActivity
com.facebook.ads.InterstitialAdActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabMainActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
com.vungle.publisher.FlexViewAdActivity
Receivers
a.a.a.c
a.a.a.d
Activity-related intent filters
org.cocos2dx.cpp.AppActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
a.a.a.d
actions: android.net.conn.CONNECTIVITY_CHANGE
a.a.a.c
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
798
Uncompressed size
23519847
Highest datetime
2018-07-06 17:38:02
Lowest datetime
1980-01-01 08:00:00
Contained files by extension
png
467
xml
241
ogg
29
so
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
467
XML
240
unknown
59
OGG
29
ELF
2
DEX
1
File identification
MD5 b068fe208a42f669aedef59244aa21ba
SHA1 04abe0a28bcd0a93f03b01bb90ca9c56ab6ef194
SHA256 86af645610a394bed295641a9fec2fe8ad81c733d9ca64b6574a2aad73cded81
ssdeep
393216:pMPsLipgTmXIHnjJpzcz1Lm3mMxVeD1J6PD4HXQ0T:CsLipgTfJmRukD1J674HXv

File size 14.8 MB ( 15475167 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (65.6%)
Java Archive (18.1%)
Mozilla Firefox browser extension (10.0%)
ZIP compressed archive (5.0%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-07-18 04:18:47 UTC ( 6 months ago )
Last submission 2018-12-08 19:18:06 UTC ( 1 month, 1 week ago )
File names 173.apk
Block Puzzle Jewel_v37.0_apkpure.com.apk
Block%20Puzzle%20Jewel.apk
b068fe208a42f669aedef59244aa21ba.apk
1016609_2b95a1_com.differencetenderwhite.skirt-37.apk
block-puzzle-jewel.apk
B068FE208A42F669AEDEF59244AA21BA
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!