× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 97ff04753714a4cb339d6902c011f992c74db24a0cc1f5ab5eaa3d298a1c170c
File name: ce11071a34aa3641a7e3485a2f0d16b9a518b129266c732d202456cd379e62800...
Detection ratio: 0 / 56
Analysis date: 2016-08-13 06:47:52 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160813
AegisLab 20160813
AhnLab-V3 20160812
Alibaba 20160812
ALYac 20160813
Antiy-AVL 20160813
Arcabit 20160813
Avast 20160813
AVG 20160812
Avira (no cloud) 20160813
AVware 20160813
Baidu 20160812
BitDefender 20160813
Bkav 20160812
CAT-QuickHeal 20160812
ClamAV 20160813
CMC 20160811
Comodo 20160813
Cyren 20160813
DrWeb 20160813
Emsisoft 20160813
ESET-NOD32 20160812
F-Prot 20160813
F-Secure 20160813
Fortinet 20160813
GData 20160813
Ikarus 20160812
Jiangmin 20160813
K7AntiVirus 20160813
K7GW 20160813
Kaspersky 20160813
Kingsoft 20160813
Malwarebytes 20160813
McAfee 20160813
McAfee-GW-Edition 20160813
Microsoft 20160813
eScan 20160813
NANO-Antivirus 20160812
nProtect 20160812
Panda 20160812
Qihoo-360 20160813
Rising 20160813
Sophos AV 20160812
SUPERAntiSpyware 20160813
Symantec 20160813
Tencent 20160813
TheHacker 20160812
TotalDefense 20160813
TrendMicro 20160813
TrendMicro-HouseCall 20160813
VBA32 20160812
VIPRE 20160813
ViRobot 20160813
Yandex 20160812
Zillya 20160812
Zoner 20160813
The file being studied is Android related! APK Android file more specifically. The application's main package name is rge.tech.usuarios. The internal version number of the application is 42. The displayed version string of the application is 3.6.10. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
rge.tech.usuarios.ActivitySplashScreen
rge.tech.usuarios.ActivityInfografia
rge.tech.usuarios.ActivityMain
rge.tech.usuarios.AnadirZona
rge.tech.usuarios.MapFragment
com.google.android.gms.ads.AdActivity
rge.tech.usuarios.SplashAdActivity
rge.tech.usuarios.ActivityAvisoGps
rge.tech.usuarios.ActivityPromos
com.google.android.gms.common.api.GoogleApiActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
rge.tech.usuarios.MyService
rge.tech.usuarios.GcmIntentService
Receivers
rge.tech.usuarios.GcmBroadcastReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Activity-related intent filters
rge.tech.usuarios.ActivitySplashScreen
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
rge.tech.usuarios.ActivityMain
actions: android.intent.action.SEND
categories: com.google.android.voicesearch.SELF_NOTE
Receiver-related intent filters
rge.tech.usuarios.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, notification_cancelled
categories: rge.tech.usuarios
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1193
Uncompressed size
8957026
Highest datetime
2016-07-27 11:49:40
Lowest datetime
2016-07-27 11:48:42
Contained files by extension
png
905
xml
91
otf
2
Contained files by type
PNG
905
XML
91
unknown
2
HTML
2
File identification
MD5 9eadacda48e97d0226e3285940a0148b
SHA1 b11901d6d8dd51f41fdce8992a8a2ca79d3ad3ba
SHA256 97ff04753714a4cb339d6902c011f992c74db24a0cc1f5ab5eaa3d298a1c170c
ssdeep
196608:1FxtZiVAbIe5cIyVBC3tQ9Vb+UyIOf4wvA/h0NvTOguWDUCU/7N7yg1hyqGG9IZv:TxtZiVAR7yVwdAYA+NvTzfU/57yihyqa

File size 11.4 MB ( 11999984 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android

VirusTotal metadata
First submission 2016-07-28 14:57:52 UTC ( 2 years, 6 months ago )
Last submission 2016-10-24 19:34:54 UTC ( 2 years, 3 months ago )
File names rge.tech.usuarios-2.apk
radares-y-controles-noroeste.apk
ce11071a34aa3641a7e3485a2f0d16b9a518b129266c732d202456cd379e62800d205dc8f1c5bd7fcb5689e85424d8e2eac3b8b22f63d5a583cb056171102017
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
com.google.analytics.RADIO_POWERED
Opened files
/data/data/rge.tech.usuarios/files/gaClientId
/data/data/rge.tech.usuarios/cache/volley
Accessed files
/data/data/rge.tech.usuarios/cache/volley
Contacted URLs
https://ssl.google-analytics.com/batch