× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9ba0d5eae3f79d0d2c1a0f5b5ff080385a7070c4bc0ee1ebae487ceec2f3af81
File name: 611628_83a42c_net.elvista.checkers-77.apk
Detection ratio: 0 / 54
Analysis date: 2016-07-14 16:11:14 UTC ( 2 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160714
AegisLab 20160714
AhnLab-V3 20160714
Alibaba 20160714
ALYac 20160714
Antiy-AVL 20160714
Arcabit 20160714
Avast 20160714
AVG 20160714
Avira (no cloud) 20160714
AVware 20160714
Baidu 20160714
BitDefender 20160714
Bkav 20160714
CAT-QuickHeal 20160714
ClamAV 20160714
CMC 20160714
Comodo 20160714
Cyren 20160714
DrWeb 20160714
Emsisoft 20160714
ESET-NOD32 20160714
F-Prot 20160714
F-Secure 20160714
Fortinet 20160714
GData 20160714
Ikarus 20160714
Jiangmin 20160714
K7AntiVirus 20160714
K7GW 20160714
Kaspersky 20160714
Kingsoft 20160714
Malwarebytes 20160714
McAfee 20160714
McAfee-GW-Edition 20160714
Microsoft 20160714
eScan 20160714
NANO-Antivirus 20160714
nProtect 20160714
Panda 20160714
Qihoo-360 20160714
Sophos AV 20160714
SUPERAntiSpyware 20160714
Symantec 20160714
Tencent 20160714
TheHacker 20160714
TotalDefense 20160713
TrendMicro 20160714
TrendMicro-HouseCall 20160714
VBA32 20160714
VIPRE 20160714
ViRobot 20160714
Zillya 20160714
Zoner 20160714
The file being studied is Android related! APK Android file more specifically. The application's main package name is net.elvista.checkers. The internal version number of the application is 77. The displayed version string of the application is 2.4. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
net.elvista.checkers.permission.C2D_MESSAGE (C2DM permission.)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.ansca.corona.CoronaActivity
com.ansca.corona.CameraActivity
com.ansca.corona.VideoActivity
com.ansca.corona.purchasing.StoreActivity
com.google.android.gms.ads.AdActivity
com.purplebrain.adbuddiz.sdk.AdBuddizActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.ads.InterstitialAdActivity
com.chartboost.sdk.CBImpressionActivity
com.vungle.sdk.VungleAdvert
com.apptracker.android.module.AppModuleActivity
com.fusepowered.nx.monetization.activities.InterstitialActivity
com.fusepowered.nx.videoplayer.VideoActivity
com.google.android.gms.ads.AdActivity
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
com.fusepowered.m2.mobileads.M2Activity
com.fusepowered.m2.mobileads.M2RActivity
com.fusepowered.m2.common.M2Browser
com.fusepowered.m2.mobileads.M2RvpActivity
com.fusepowered.m1.android.MMActivity
com.fusepowered.m1.android.VideoPlayer
com.fusepowered.u1.U1InterstitialActivity
com.fusepowered.ads.adapters.FuseInterstitialActivity
com.fusepowered.l1.AdActivity
com.fusepowered.l1.AdBrowserActivity
com.fusepowered.l1.PlayerActivity
com.fusepowered.ac.ACOActivity
com.fusepowered.ac.ACFActivity
com.fusepowered.ac.ACBActivity
com.fusepowered.ads.adapters.LRActivity
com.fusepowered.ads.adapters.MRaidActivity
com.fusepowered.ads.adapters.MRaidVideoActivity
com.fusepowered.sa.android.publish.list3d.List3DActivity
com.fusepowered.sa.android.publish.AppWallActivity
com.fusepowered.as.view.ASVastInterstitialActivity
com.fusepowered.as.view.ASWebviewInterstitialActivity
com.fusepowered.ap.MainActivity
com.fusepowered.ap.BrowserActivity
com.fusepowered.ap.VDActivity
com.fusepowered.al.adview.ALInterstitialActivity
com.fusepowered.al.adview.ALConfirmationActivity
com.fusepowered.ads.adapters.ALActivity
com.fusepowered.im.androidsdk.IMBrowserActivity
com.fusepowered.ads.adapters.CBActivity
com.fusepowered.vast.activity.VASTActivity
Services
com.ansca.corona.CoronaService
com.vungle.sdk.VungleIntentService
Receivers
com.ansca.corona.SystemStartupBroadcastReceiver
com.ansca.corona.notifications.AlarmManagerBroadcastReceiver
com.ansca.corona.notifications.StatusBarBroadcastReceiver
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
Providers
com.ansca.corona.storage.FileContentProvider
Activity-related intent filters
com.ansca.corona.CoronaActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.fusepowered.fuseactivities.FuseApiMoregamesBrowser
actions: com.fusepowered.fuseactivities.FuseApiMoregamesBrowser, android.intent.action.VIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.ansca.corona.notifications.GoogleCloudMessagingBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: net.elvista.checkers
com.ansca.corona.SystemStartupBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED
com.ansca.corona.purchasing.GoogleStoreBroadcastReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1076
Uncompressed size
48290102
Highest datetime
2016-06-06 12:31:34
Lowest datetime
2016-02-18 02:23:44
Contained files by extension
png
806
jpg
106
mp3
19
so
11
ttf
7
db
2
xml
1
dex
1
MF
1
car
1
RSA
1
SF
1
Contained files by type
PNG
806
JPG
106
directory
42
MP3
19
unknown
14
ELF
11
XML
1
DEX
1
File identification
MD5 f9c1f6ddbb1a48456f9a74650089415b
SHA1 1adf7359567c1d0886f26454d31b7ded38bfd0eb
SHA256 9ba0d5eae3f79d0d2c1a0f5b5ff080385a7070c4bc0ee1ebae487ceec2f3af81
ssdeep
786432:QZVzI/mLkkFLyqpSnokqHmkjnsBrLJ9UM4:YmuLx1/pSHqGkrsBTn4

File size 47.3 MB ( 49637795 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (66.4%)
Java Archive (18.3%)
Mozilla Archive Format (gen) (8.8%)
ZIP compressed archive (5.0%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2016-06-07 04:48:48 UTC ( 2 years, 9 months ago )
Last submission 2018-11-03 06:18:12 UTC ( 4 months, 2 weeks ago )
File names checkers-hd-2.4.apk
checkers-elite.apk
checkers-elite-2-4.apk
wawki-2.4.apk
base.apk
611628_83a42c_net.elvista.checkers-77.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.intent.action.SCREEN_OFF
android.intent.action.SCREEN_ON
android.intent.action.USER_PRESENT
android.media.RINGER_MODE_CHANGED
Opened files
/data/app/net.elvista.checkers-1.apk
/data/data/net.elvista.checkers/cache/.system/temp
/data/data/net.elvista.checkers/cache/.system
/data/data/net.elvista.checkers/files/coronaResources
Accessed files
/mnt/sdcard/Android/obb/net.elvista.checkers
/data/data/net.elvista.checkers/cache/.system/NotificationSettings.xml