× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9eb1b3db20d224969b63a6c18cf02623694acf58b886e03a46ae34e18fd926e0
File name: monster-city.apk
Detection ratio: 0 / 58
Analysis date: 2017-06-28 13:05:29 UTC ( 1 year, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170628
AegisLab 20170628
AhnLab-V3 20170628
Alibaba 20170628
ALYac 20170628
Antiy-AVL 20170628
Arcabit 20170628
Avast 20170628
AVG 20170628
Avira (no cloud) 20170628
AVware 20170628
Baidu 20170628
BitDefender 20170628
CAT-QuickHeal 20170628
ClamAV 20170628
CMC 20170628
Comodo 20170628
CrowdStrike Falcon (ML) 20170420
Cyren 20170628
DrWeb 20170628
Emsisoft 20170628
Endgame 20170615
ESET-NOD32 20170628
F-Prot 20170628
F-Secure 20170628
Fortinet 20170628
GData 20170628
Ikarus 20170628
Sophos ML 20170607
Jiangmin 20170628
K7AntiVirus 20170627
K7GW 20170628
Kaspersky 20170628
Kingsoft 20170628
Malwarebytes 20170628
McAfee 20170628
McAfee-GW-Edition 20170628
Microsoft 20170628
eScan 20170628
NANO-Antivirus 20170628
nProtect 20170628
Palo Alto Networks (Known Signatures) 20170628
Panda 20170628
Qihoo-360 20170628
Rising 20170628
SentinelOne (Static ML) 20170516
Sophos AV 20170628
SUPERAntiSpyware 20170628
Symantec 20170628
Symantec Mobile Insight 20170627
Tencent 20170628
TheHacker 20170628
TotalDefense 20170628
Trustlook 20170628
VBA32 20170628
VIPRE 20170628
ViRobot 20170628
Webroot 20170628
WhiteArmor 20170627
Yandex 20170627
Zillya 20170623
ZoneAlarm by Check Point 20170628
Zoner 20170628
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tappocket.monstercity. The internal version number of the application is 1497183930. The displayed version string of the application is 7.31. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
com.tappocket.monstercity.permission.RECEIVE_ADM_MESSAGE (Unknown permission from android reference)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
com.amazon.device.messaging.permission.RECEIVE (Unknown permission from android reference)
Activities
com.apportable.activity.VerdeActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.LoginActivity
Services
com.apportable.adm.ADMMessageHandler
com.apportable.media.AudioManagerService
com.apportable.notifications.LocalNotificationService
com.apportable.iap.BillingService
com.parse.PushService
Receivers
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
com.apportable.notifications.NotificationsBootReceiver
com.apportable.notifications.NotificationsAlarmReceiver
com.apportable.iap.BillingReceiver
com.parse.ParseBroadcastReceiver
com.parsebridge.ParseReceiverIntent
Activity-related intent filters
com.apportable.activity.VerdeActivity
actions: android.intent.action.VIEW, android.intent.action.MAIN, android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE, android.intent.category.LAUNCHER
Receiver-related intent filters
com.apportable.notifications.NotificationsBootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
com.parsebridge.ParseReceiverIntent
actions: com.tappocket.monstercity
com.parse.ParseBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
actions: com.amazon.device.messaging.intent.REGISTRATION, com.amazon.device.messaging.intent.RECEIVE
categories: com.tappocket.monstercity
com.apportable.iap.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3322
Uncompressed size
21305968
Highest datetime
2017-06-11 18:25:52
Lowest datetime
2014-07-17 18:21:32
Contained files by extension
png
809
xml
33
mp3
30
jpg
6
txt
3
m4a
1
fnt
1
Contained files by type
PNG
809
XML
148
OGG
31
unknown
6
JPG
6
File identification
MD5 80eecdf9d413f0a7ebf83d2ef5e2a1f0
SHA1 19ade9a50f47ff1ef4d7b9346971639f21dd5927
SHA256 9eb1b3db20d224969b63a6c18cf02623694acf58b886e03a46ae34e18fd926e0
ssdeep
1572864:3eHy4cDV77tloQsEQGAGDzV6or/8mAxJ7IJgNjwmX:3eS4cZToaQ4XV6oj814gNjwmX

File size 64.7 MB ( 67797067 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (50.4%)
Java Archive (13.9%)
BlueEyes Animation (12.9%)
Sweet Home 3D design (generic) (10.0%)
Konfabulator widget (7.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-06-28 13:05:29 UTC ( 1 year, 8 months ago )
Last submission 2017-06-28 13:05:29 UTC ( 1 year, 8 months ago )
File names monster-city.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!