× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 877172fe8023bcf78e88cc5a4a21713357025dea29789ae09060f00f1624818b
File name: base.apk
Detection ratio: 0 / 55
Analysis date: 2016-06-09 11:07:18 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160609
AegisLab 20160609
AhnLab-V3 20160609
Alibaba 20160608
Antiy-AVL 20160609
Arcabit 20160609
Avast 20160609
AVG 20160609
Avira (no cloud) 20160609
AVware 20160609
Baidu 20160608
Baidu-International 20160606
BitDefender 20160609
Bkav 20160608
CAT-QuickHeal 20160609
ClamAV 20160609
CMC 20160607
Comodo 20160609
Cyren 20160609
DrWeb 20160609
Emsisoft 20160609
ESET-NOD32 20160609
F-Prot 20160609
F-Secure 20160609
Fortinet 20160609
GData 20160609
Ikarus 20160609
Jiangmin 20160609
K7AntiVirus 20160609
K7GW 20160609
Kaspersky 20160609
Kingsoft 20160609
Malwarebytes 20160609
McAfee 20160609
McAfee-GW-Edition 20160609
Microsoft 20160609
eScan 20160609
NANO-Antivirus 20160609
nProtect 20160608
Panda 20160608
Qihoo-360 20160609
Rising 20160609
Sophos AV 20160609
SUPERAntiSpyware 20160609
Symantec 20160609
Tencent 20160609
TheHacker 20160607
TrendMicro 20160609
TrendMicro-HouseCall 20160609
VBA32 20160609
VIPRE 20160609
ViRobot 20160609
Yandex 20160608
Zillya 20160609
Zoner 20160609
The file being studied is Android related! APK Android file more specifically. The application's main package name is rge.tech.usuarios. The internal version number of the application is 41. The displayed version string of the application is 3.6.9. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
rge.tech.usuarios.ActivitySplashScreen
rge.tech.usuarios.ActivityInfografia
rge.tech.usuarios.ActivityMain
rge.tech.usuarios.AnadirZona
rge.tech.usuarios.MapFragment
com.google.android.gms.ads.AdActivity
rge.tech.usuarios.SplashAdActivity
rge.tech.usuarios.ActivityAvisoGps
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
rge.tech.usuarios.ActivityPromos
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
rge.tech.usuarios.MyService
rge.tech.usuarios.GcmIntentService
Receivers
rge.tech.usuarios.GcmBroadcastReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Activity-related intent filters
rge.tech.usuarios.ActivitySplashScreen
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
rge.tech.usuarios.ActivityMain
actions: android.intent.action.SEND
categories: com.google.android.voicesearch.SELF_NOTE
Receiver-related intent filters
rge.tech.usuarios.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: rge.tech.usuarios
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1089
Uncompressed size
3945076
Highest datetime
2016-06-09 12:19:04
Lowest datetime
2016-06-09 12:17:52
Contained files by extension
png
826
xml
171
otf
2
Contained files by type
PNG
826
XML
171
unknown
2
HTML
1
File identification
MD5 be7bc1179304b41f592c2cfe7f9a1d6b
SHA1 23ed10bc104fe195ecb4ba1ad09fd104d3957f38
SHA256 877172fe8023bcf78e88cc5a4a21713357025dea29789ae09060f00f1624818b
ssdeep
196608:vFt0WmJiFcKGVA2VdNuMJC1RcnQMVkvRcYrerF55BVDva:vFt0WmJ8cbWshJc40reZTDva

File size 6.7 MB ( 6975670 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-06-09 11:07:18 UTC ( 2 years, 8 months ago )
Last submission 2018-04-06 18:02:15 UTC ( 10 months, 2 weeks ago )
File names radares-y-controles-noroeste.apk
base.apk
9ab2fd16d942364c34f20e9aa0b5e8c8af2e7311417174b3e1bc2774c272b2ee46ecc8efdaed4bb5d990173c43e16a849f04f906dbe94e6649e451307dbb0389
BE7BC1179304B41F592C2CFE7F9A1D6B
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!