× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 913828779cba0d73db1047db0d268e39db4d7647442ba006cb293f289d966f61
File name: com.dmall.mfandroid.apk
Detection ratio: 0 / 54
Analysis date: 2016-01-18 15:48:46 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
AegisLab 20160118
Yandex 20160117
AhnLab-V3 20160118
Alibaba 20160118
ALYac 20160118
Antiy-AVL 20160118
Arcabit 20160118
Avast 20160118
AVG 20160118
Avira (no cloud) 20160118
Baidu-International 20160118
BitDefender 20160118
Bkav 20160118
ByteHero 20160118
CAT-QuickHeal 20160118
ClamAV 20160118
CMC 20160111
Comodo 20160118
Cyren 20160118
DrWeb 20160118
Emsisoft 20160118
ESET-NOD32 20160118
F-Prot 20160118
F-Secure 20160118
Fortinet 20160118
GData 20160118
Ikarus 20160118
Jiangmin 20160118
K7AntiVirus 20160118
K7GW 20160118
Kaspersky 20160118
Kingsoft 20160118
Malwarebytes 20160118
McAfee 20160118
McAfee-GW-Edition 20160118
Microsoft 20160118
eScan 20160118
NANO-Antivirus 20160118
nProtect 20160118
Panda 20160117
Qihoo-360 20160118
Rising 20160118
Sophos AV 20160118
SUPERAntiSpyware 20160118
Symantec 20160117
TheHacker 20160116
TotalDefense 20160118
TrendMicro 20160118
TrendMicro-HouseCall 20160118
VBA32 20160117
VIPRE 20160118
ViRobot 20160118
Zillya 20160117
Zoner 20160118
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.dmall.mfandroid. The internal version number of the application is 29. The displayed version string of the application is 3.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
com.dmall.mfandroid.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CAMERA (take pictures and videos)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.dmall.mfandroid.activity.base.Splash
com.dmall.mfandroid.activity.base.NHomeActivity
com.facebook.LoginActivity
scanpay.it.ScanPayActivity
scanpay.it.ValidationActivity
Services
com.netmera.mobile.NetmeraIntentService
com.dmall.mfandroid.receiver.TrackingIntentService
com.dmall.mfandroid.appwidget.StackWidgetService
Receivers
com.netmera.mobile.NetmeraBroadcastReceiver
com.dmall.mfandroid.appwidget.StackWidgetProvider
com.dmall.mfandroid.omniture.GPBroadcastReceiver
Activity-related intent filters
com.dmall.mfandroid.activity.base.Splash
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.dmall.mfandroid.activity.base.NHomeActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.netmera.mobile.NetmeraBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.dmall.mfandroid
com.dmall.mfandroid.appwidget.StackWidgetProvider
actions: android.appwidget.action.APPWIDGET_UPDATE
com.dmall.mfandroid.omniture.GPBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2084
Uncompressed size
3063944
Highest datetime
2015-02-12 11:13:08
Lowest datetime
2015-02-12 11:11:50
Contained files by extension
png
573
xml
419
ttf
4
Contained files by type
PNG
573
XML
419
unknown
7
JSON
1
File identification
MD5 ed359aee965bce777e2bba7006e30b2b
SHA1 d3431e1ae252dd2e303171c7ace02837ddb95e50
SHA256 913828779cba0d73db1047db0d268e39db4d7647442ba006cb293f289d966f61
ssdeep
196608:8oFyJjbOHngccjEdsq1LCgoO3xTSZsBXFn9ETkBuHfKW8a3hEoldceaWDFm0rZzO:mccupbXFn9EUYf38Mhdcom0rZz+qxKT

File size 12.5 MB ( 13152346 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (62.1%)
Java Archive (17.1%)
BlueEyes Animation (15.9%)
ZIP compressed archive (4.7%)
Tags
apk android

VirusTotal metadata
First submission 2015-02-21 04:29:37 UTC ( 3 years, 12 months ago )
Last submission 2016-10-31 03:38:41 UTC ( 2 years, 3 months ago )
File names com.dmall.mfandroid.apk
913828779cba0d73db1047db0d268e39db4d7647442ba006cb293f289d966f61
bfc02986b235602468a755c4fb1d9e6310785857daad8968ae238920319ce53cf4e142a1af7bada7ea99c3d800a7e61e93aa3810a334d288ad58611ef0c89c02
n11-com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_FINE_LOCATION:com.dmall.mfandroid
android.permission.ACCESS_NETWORK_STATE:com.dmall.mfandroid
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/com.dmall.mfandroid/files/AdjustIoActivityState
/data/data/com.dmall.mfandroid/files/AdjustIoPackageQueue
/data/data/com.dmall.mfandroid/files
/data/data/com.dmall.mfandroid/files/MintSavedData-1-1349849042936.json
APP_ASSETS/ADBMobileConfig.json
/data/data/com.dmall.mfandroid/files/Mint-lastsavedfile
Accessed files
/data/data/com.dmall.mfandroid/files
/sbin/su
/system/bin/su
/system/xbin/su
/data/data/com.dmall.mfandroid/cacheADBMobileDataCache.sqlite
/data/data/com.dmall.mfandroid/files/.setForceSendPingOnNextStart
/data/data/com.dmall.mfandroid/files/MintSavedData-1-1349849042936.json
/data/data/com.dmall.mfandroid/files/Mint-lastsavedfile
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://dogusplanet.d3.sc.omtrdc.net/id
https://app.adjust.io/startup
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...
https://c6b1a11f.api.splkmobile.com/1.0/c6b1a11f/4abc3a0176842d6ccb82ea005a6ed156/0/1/hash=none
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider