× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4e7709099016b2189e83eedb5d3123600d580ef7bbf8ed22c33d6267651351b
File name: base.apk
Detection ratio: 0 / 60
Analysis date: 2018-11-17 15:07:45 UTC ( 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20181117
AegisLab 20181117
AhnLab-V3 20181117
Alibaba 20180921
ALYac 20181117
Antiy-AVL 20181117
Arcabit 20181117
Avast 20181117
Avast-Mobile 20181117
AVG 20181117
Avira (no cloud) 20181117
Babable 20180918
Baidu 20181116
BitDefender 20181117
Bkav 20181116
CAT-QuickHeal 20181117
ClamAV 20181117
CMC 20181117
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181117
Cyren 20181117
DrWeb 20181117
eGambit 20181117
Emsisoft 20181117
Endgame 20181108
ESET-NOD32 20181117
F-Prot 20181117
F-Secure 20181117
Fortinet 20181117
GData 20181117
Ikarus 20181117
Sophos ML 20181108
Jiangmin 20181117
K7AntiVirus 20181117
K7GW 20181117
Kaspersky 20181117
Kingsoft 20181117
Malwarebytes 20181117
MAX 20181117
McAfee 20181117
McAfee-GW-Edition 20181117
Microsoft 20181117
eScan 20181117
NANO-Antivirus 20181117
Palo Alto Networks (Known Signatures) 20181117
Panda 20181117
Qihoo-360 20181117
Rising 20181117
SentinelOne (Static ML) 20181011
Sophos AV 20181117
SUPERAntiSpyware 20181114
Symantec 20181116
Symantec Mobile Insight 20181108
TACHYON 20181117
Tencent 20181117
TheHacker 20181117
TotalDefense 20181117
TrendMicro 20181117
TrendMicro-HouseCall 20181117
Trustlook 20181117
VBA32 20181116
VIPRE 20181117
ViRobot 20181117
Webroot 20181117
Yandex 20181116
Zillya 20181116
ZoneAlarm by Check Point 20181117
Zoner 20181117
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.color.mandala. The internal version number of the application is 916. The displayed version string of the application is 9.1.6. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.VIBRATE (control vibrator)
com.sec.android.iap.permission.BILLING (Unknown permission from android reference)
com.sec.android.provider.badge.permission.READ (Unknown permission from android reference)
com.majeur.launcher.permission.UPDATE_BADGE (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.htc.launcher.permission.UPDATE_SHORTCUT (Unknown permission from android reference)
com.htc.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.sonyericsson.home.permission.BROADCAST_BADGE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
com.sec.android.provider.badge.permission.WRITE (Unknown permission from android reference)
com.anddoes.launcher.permission.UPDATE_COUNT (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
com.puzzletime.jigsaw.permissionmanager.MainActivity
com.adincube.sdk.AdinCubeActivity
com.adincube.sdk.mediation.chartboost.ChartboostActivity
com.samsung.android.sdk.iap.lib.activity.InboxActivity
com.samsung.android.sdk.iap.lib.activity.ItemActivity
com.samsung.android.sdk.iap.lib.activity.PaymentActivity
tv.superawesome.sdk.views.SAVideoAd
tv.superawesome.sdk.views.SAInterstitialAd
com.amazon.device.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.facebook.ads.AudienceNetworkActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.onesignal.PermissionsActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
Services
com.google.android.gms.analytics.CampaignTrackingService
tv.superawesome.lib.sanetwork.asynctask.SAAsyncTask$SAAsync
com.onesignal.GcmIntentService
com.onesignal.SyncService
Receivers
com.area730.localnotif.NotificationReciever
com.google.android.gms.analytics.CampaignTrackingReceiver
com.amazon.device.iap.ResponseReceiver
tv.superawesome.lib.sacpi.SACPI
com.onesignal.NotificationOpenedReceiver
Providers
android.support.v4.content.FileProvider
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
tv.superawesome.lib.sacpi.SACPI
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
776
Uncompressed size
132863234
Highest datetime
2017-09-15 11:57:22
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
96
xml
39
dll
21
so
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
616
PNG
96
XML
39
Portable Executable
21
ELF
3
DEX
1
File identification
MD5 beef2bf56f32470f208486a20ecd6d6a
SHA1 196126f435cd3a4031e2a3540b4730d7d004caad
SHA256 a4e7709099016b2189e83eedb5d3123600d580ef7bbf8ed22c33d6267651351b
ssdeep
786432:kjHD3bkusckx9nrGz9NwSs2/2NybS/S1UbQai/1BRF4Fg3Iw2:kjHn/OnizU82NeS/Lb3WBRFIwk

File size 35.3 MB ( 36982913 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-09-15 13:55:52 UTC ( 1 year, 6 months ago )
Last submission 2018-12-12 13:32:41 UTC ( 3 months, 1 week ago )
File names com.color.mandala-1.apk
mandala.apk
base.apk
beef2bf56f32470f208486a20ecd6d6a.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!