× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 89fe8376564f1d6100cd9d6065bd30d35d19d5a569af17e7ef1971401d56241d
File name: 745.apk
Detection ratio: 0 / 59
Analysis date: 2019-04-04 09:38:14 UTC ( 1 month, 2 weeks ago ) View latest
Antivirus Result Update
Acronis 20190330
Ad-Aware 20190404
AegisLab 20190404
AhnLab-V3 20190404
Alibaba 20190402
ALYac 20190404
Antiy-AVL 20190404
Arcabit 20190404
Avast 20190404
Avast-Mobile 20190404
AVG 20190404
Avira (no cloud) 20190404
Babable 20180918
Baidu 20190318
BitDefender 20190404
Bkav 20190404
CAT-QuickHeal 20190403
ClamAV 20190404
CMC 20190321
Comodo 20190404
CrowdStrike Falcon (ML) 20190212
Cybereason 20190403
Cyren 20190404
DrWeb 20190404
eGambit 20190404
Emsisoft 20190404
Endgame 20190403
ESET-NOD32 20190404
F-Secure 20190404
FireEye 20190404
Fortinet 20190404
GData 20190404
Sophos ML 20190313
Jiangmin 20190404
K7AntiVirus 20190404
K7GW 20190404
Kaspersky 20190404
Kingsoft 20190404
Malwarebytes 20190404
MAX 20190404
McAfee 20190404
McAfee-GW-Edition 20190403
Microsoft 20190404
eScan 20190404
NANO-Antivirus 20190404
Palo Alto Networks (Known Signatures) 20190404
Panda 20190403
Qihoo-360 20190404
Rising 20190404
SentinelOne (Static ML) 20190317
Sophos AV 20190404
SUPERAntiSpyware 20190404
Symantec Mobile Insight 20190325
TACHYON 20190404
Tencent 20190404
TheHacker 20190403
TotalDefense 20190404
Trapmine 20190325
TrendMicro-HouseCall 20190404
Trustlook 20190404
VBA32 20190404
VIPRE 20190403
ViRobot 20190404
Yandex 20190402
Zillya 20190403
ZoneAlarm by Check Point 20190404
Zoner 20190404
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.mgc.miami.crime.simulator.two. The internal version number of the application is 54. The displayed version string of the application is 3.3. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerActivity
com.chartboost.sdk.CBImpressionActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.common.api.GoogleApiActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.unity.purchasing.googleplay.VRPurchaseActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
Services
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.components.ComponentDiscoveryService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.google.android.gms.ads.MobileAdsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.unity.purchasing.googleplay.VRPurchaseActivity
actions: com.google.vr.vrcore.ACTION_NONE
categories: com.google.intent.category.DAYDREAM
com.unity3d.player.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
573
Uncompressed size
234337215
Highest datetime
2019-03-07 19:25:06
Lowest datetime
1980-01-01 07:00:00
Contained files by extension
dll
74
xml
53
png
49
so
10
dex
1
neo
1
MF
1
pos
1
RSA
1
SF
1
Contained files by type
unknown
386
Portable Executable
74
XML
53
PNG
49
ELF
10
DEX
1
File identification
MD5 2b8972466dd8bd02654bf5149e98f137
SHA1 194a90ce4371656238f2bc241d0ba62e3f7a7df8
SHA256 89fe8376564f1d6100cd9d6065bd30d35d19d5a569af17e7ef1971401d56241d
ssdeep
1572864:zGsUv4Pqy9PVT1ExhvR9qbwUrU3GnB8K1QquhWOPaumrUOjwNYID037fz8LS4FWn:zUQSy9PVQR3swKB8WQquhWOPZmrnwdDk

File size 95.7 MB ( 100384912 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2019-03-17 23:19:09 UTC ( 2 months, 1 week ago )
Last submission 2019-04-04 16:40:45 UTC ( 1 month, 2 weeks ago )
File names 745.apk
miami-crime-simulator-2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!