× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 945549456195de3dcbbbb76eed8f3db5bc6c8415de048e9ce81738ec41673790
File name: es.cm.android-2.apk
Detection ratio: 0 / 57
Analysis date: 2016-04-22 10:57:50 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160422
AegisLab 20160422
AhnLab-V3 20160421
Alibaba 20160422
ALYac 20160422
Antiy-AVL 20160422
Arcabit 20160422
Avast 20160422
AVG 20160422
Avira (no cloud) 20160422
AVware 20160422
Baidu 20160422
Baidu-International 20160422
BitDefender 20160422
Bkav 20160421
CAT-QuickHeal 20160422
ClamAV 20160422
CMC 20160421
Comodo 20160422
Cyren 20160422
DrWeb 20160422
Emsisoft 20160422
ESET-NOD32 20160422
F-Prot 20160422
F-Secure 20160422
Fortinet 20160422
GData 20160422
Ikarus 20160422
Jiangmin 20160422
K7AntiVirus 20160422
K7GW 20160422
Kaspersky 20160422
Kingsoft 20160422
Malwarebytes 20160422
McAfee 20160422
McAfee-GW-Edition 20160422
Microsoft 20160422
eScan 20160422
NANO-Antivirus 20160422
nProtect 20160422
Panda 20160421
Qihoo-360 20160422
Rising 20160422
Sophos AV 20160422
SUPERAntiSpyware 20160422
Symantec 20160422
Tencent 20160422
TheHacker 20160421
TotalDefense 20160421
TrendMicro 20160422
TrendMicro-HouseCall 20160422
VBA32 20160421
VIPRE 20160422
ViRobot 20160422
Yandex 20160421
Zillya 20160422
Zoner 20160422
The file being studied is Android related! APK Android file more specifically. The application's main package name is es.cm.android. The internal version number of the application is 415345. The displayed version string of the application is 4.26. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 11.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
External libraries
com.google.android.maps
Activities
es.cm.android.activity.SplashActivity
es.cm.android.activity.HomeActivity
es.cm.android.activity.OfmovilActivity
es.cm.android.activity.VideoControllerActivity
es.cm.android.activity.FinderActivity
es.cm.android.finder.AssetListActivity
es.cm.android.finder.RouteActivity
Providers
android.support.v4.content.FileProvider
Activity-related intent filters
es.cm.android.activity.SplashActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
es.cm.android.activity.FinderActivity
actions: android.intent.action.SEARCH
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1301
Uncompressed size
3637324
Highest datetime
2015-12-04 09:12:50
Lowest datetime
2015-02-03 10:50:16
Contained files by extension
png
568
xml
425
otf
3
gif
1
Contained files by type
PNG
567
XML
425
unknown
6
HTML
1
GIF
1
File identification
MD5 cb2ee59beafd59c6e614babff00f94bd
SHA1 55f55cbc16bc2100f6bcb0443cddd173418bcb7d
SHA256 945549456195de3dcbbbb76eed8f3db5bc6c8415de048e9ce81738ec41673790
ssdeep
98304:r+a6BwxVPUm4xdBg9V1A7WpuhA3P3zT2nPwsEvCqiLtMIGzRie:qePh4BgbaKpuerT2nPwOqLie

File size 4.5 MB ( 4764973 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (66.4%)
Java Archive (18.3%)
Mozilla Archive Format (gen) (8.8%)
ZIP compressed archive (5.0%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android

VirusTotal metadata
First submission 2015-12-04 09:32:03 UTC ( 3 years, 2 months ago )
Last submission 2018-11-29 14:48:50 UTC ( 2 months, 3 weeks ago )
File names es-cm-android-415345-13917042-cb2ee59beafd59c6e614babff00f94bd.apk
bankia.apk
a6b73e4ee4954937ccd7022cbe5f403a1bc8e103150b3f78c90507ea2f41d4cac07b94a70290b7018c378418b3eaf1003b7ce13afd64135e34a27413a02d927d
es.cm.android-2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/es.cm.android/cache/pdfs
/data/data/es.cm.android/files/gaClientId
/data/data/es.cm.android/files/gaInstallData
/data/data/es.cm.android/cache/messageImages
/data/data/es.cm.android/cache/adbdownloadcache
APP_ASSETS/ADBMobileConfig.json
/data/data/es.cm.android/cache/ADBMobileDataCache.sqlite
Accessed files
/data/data/es.cm.android/cache/adbdownloadcache
/data/data/es.cm.android/cache/messageImages
/data/data/es.cm.android/files/gaOptOut
/data/data/es.cm.android/cacheADBMobileDataCache.sqlite
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://m.bankia.es/PMOVILES/services/links.json
http://m.bankia.es/PMOVILES/services/broker.json/valores=BKIA.MC;.IBEX;
http://m.bankia.es/PMOVILES/services/eco/list.json/featured
http://m.bankia.es/PMOVILES/services/twitter.json
https://assets.adobedtm.com/b213090c5204bf94318f4ef0539a38b487d10368/scripts/satellite-54cb4a4d38376313087d0000.json
https://assets.adobedtm.com/b213090c5204bf94318f4ef0539a38b487d10368/scripts/satellite-54cb4a4d3837630019560600.json
https://bankia.sc.omtrdc.net/id