× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9712095d0c94cebab5d228020bd2ea98cbd402d2852c39e808ed2551e516824a
File name: cr.apk
Detection ratio: 8 / 52
Analysis date: 2014-05-15 19:59:17 UTC ( 5 years ago ) View latest
Antivirus Result Update
AntiVir SPR/ANDR.SmsReg.B.Gen 20140515
ESET-NOD32 a variant of Android/SMSreg.AO 20140515
Ikarus AdWare.AndroidOS 20140515
McAfee Artemis!581D8D1A5BD3 20140515
McAfee-GW-Edition Artemis!581D8D1A5BD3 20140515
Sophos AV Android Emagsoftware 20140515
TrendMicro-HouseCall TROJ_GEN.F47V0315 20140515
VIPRE Trojan.AndroidOS.Generic.A 20140515
Ad-Aware 20140515
AegisLab 20140515
Yandex 20140515
AhnLab-V3 20140515
Antiy-AVL 20140515
Avast 20140515
AVG 20140515
Baidu-International 20140515
BitDefender 20140515
Bkav 20140515
ByteHero 20140227
CAT-QuickHeal 20140515
ClamAV 20140515
CMC 20140512
Commtouch 20140515
Comodo 20140515
DrWeb 20140515
Emsisoft 20140515
F-Prot 20140515
F-Secure 20140515
Fortinet 20140515
GData 20140515
Jiangmin 20140515
K7AntiVirus 20140515
K7GW 20140515
Kaspersky 20140515
Kingsoft 20140515
Malwarebytes 20140515
Microsoft 20140515
eScan 20140515
NANO-Antivirus 20140515
Norman 20140515
nProtect 20140515
Panda 20140515
Qihoo-360 20140515
Rising 20140507
SUPERAntiSpyware 20140515
Symantec 20140515
Tencent 20140515
TheHacker 20140515
TotalDefense 20140515
TrendMicro 20140515
VBA32 20140514
ViRobot 20140515
Zillya 20140514
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.wildec.cr. The internal version number of the application is 131. The displayed version string of the application is 1.3.1. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 16.
Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
com.wildec.cr.PAYMENT_BROADCAST_PERMISSION (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.wildec.cr.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
android.permission.RECEIVE_SMS (receive SMS)
Activities
com.fortumo.android.FortumoActivity
com.ansca.corona.CoronaActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
Services
com.fortumo.android.FortumoService
com.fortumo.android.StatusUpdateService
com.ansca.corona.CoronaService
Receivers
com.fortumo.android.BillingSMSReceiver
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
Providers
com.ansca.corona.FileContentProvider
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.wildec.cr
com.fortumo.android.BillingSMSReceiver
actions: android.provider.Telephony.SMS_RECEIVED
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
984
Uncompressed size
51971416
Highest datetime
2013-12-11 18:40:16
Lowest datetime
2013-06-15 13:11:28
Contained files by extension
png
897
mp3
51
so
14
jpg
8
txt
2
xml
1
dex
1
MF
1
car
1
RSA
1
SF
1
gif
1
ttf
1
Contained files by type
PNG
897
MP3
51
ELF
14
unknown
9
JPG
8
XML
1
DEX
1
GIF
1
JSON
1
HTML
1
File identification
MD5 af77abb924b2ed565894484adf9f4935
SHA1 e09ec8830342f2caa5675f8fbacdc14b65c5089a
SHA256 9712095d0c94cebab5d228020bd2ea98cbd402d2852c39e808ed2551e516824a
ssdeep
786432:KVeIw82POa8W0ig/fKtxPcZEk9aRfJW+Z5NrYWnwblc9h1NZxfYmrlFQu8+XH4UM:+bw8OxNW/faPcek0RfJW+Z5lYtblc9hg

File size 45.9 MB ( 48088628 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2014-03-15 06:16:11 UTC ( 5 years, 2 months ago )
Last submission 2014-03-15 06:16:11 UTC ( 5 years, 2 months ago )
File names cr.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!