× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a4f7571f8e8d5e74607cf37a77c5de488b142213f47a439952527dc8de3e6aff
File name: rolling-ball.apk
Detection ratio: 0 / 60
Analysis date: 2017-06-19 08:46:42 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170619
AegisLab 20170618
AhnLab-V3 20170619
Alibaba 20170619
ALYac 20170619
Antiy-AVL 20170619
Arcabit 20170619
Avast 20170619
AVG 20170619
Avira (no cloud) 20170619
AVware 20170619
Baidu 20170619
BitDefender 20170619
Bkav 20170619
CAT-QuickHeal 20170619
ClamAV 20170619
CMC 20170619
Comodo 20170619
CrowdStrike Falcon (ML) 20170420
Cyren 20170619
DrWeb 20170619
Emsisoft 20170619
Endgame 20170615
ESET-NOD32 20170619
F-Prot 20170619
F-Secure 20170619
Fortinet 20170619
GData 20170619
Ikarus 20170619
Sophos ML 20170607
Jiangmin 20170619
K7AntiVirus 20170619
K7GW 20170619
Kaspersky 20170619
Kingsoft 20170619
Malwarebytes 20170619
McAfee 20170619
McAfee-GW-Edition 20170619
Microsoft 20170618
eScan 20170619
NANO-Antivirus 20170619
nProtect 20170619
Palo Alto Networks (Known Signatures) 20170619
Panda 20170618
Qihoo-360 20170619
Rising 20170619
SentinelOne (Static ML) 20170516
Sophos AV 20170619
SUPERAntiSpyware 20170619
Symantec 20170619
Symantec Mobile Insight 20170614
Tencent 20170619
TheHacker 20170618
TotalDefense 20170619
TrendMicro 20170619
TrendMicro-HouseCall 20170619
Trustlook 20170619
VBA32 20170616
VIPRE 20170619
ViRobot 20170619
Webroot 20170619
WhiteArmor 20170616
Yandex 20170616
Zillya 20170617
ZoneAlarm by Check Point 20170619
Zoner 20170619
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.amazing.rollingball. The internal version number of the application is 4. The displayed version string of the application is 1.0.3. The minimum Android API level for the application to run (MinSDKVersion) is 7. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.amazing.rollingball.RollingBallActivity
com.doodlemobile.gamecenter.moregames.MoreGamesActivity
com.google.android.gms.ads.AdActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
Services
com.google.android.gms.analytics.CampaignTrackingService
Receivers
com.google.android.gms.analytics.CampaignTrackingReceiver
com.amazing.rollingball.MyReceiver
Activity-related intent filters
com.amazing.rollingball.RollingBallActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazing.rollingball.MyReceiver
actions: com.amazing.rollingball.MyReceiver
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
275
Uncompressed size
59418859
Highest datetime
2017-01-03 20:10:10
Lowest datetime
2016-12-13 14:48:32
Contained files by extension
png
140
xml
22
dll
5
so
4
dex
1
MF
1
RSA
1
jpg
1
js
1
SF
1
Contained files by type
PNG
140
unknown
103
XML
21
Portable Executable
5
ELF
4
DEX
1
JPG
1
File identification
MD5 d86f5cf174e6af13d7eac561b8124245
SHA1 33fb574dc90a97ae3df795f16d9bcf40f9843e3b
SHA256 a4f7571f8e8d5e74607cf37a77c5de488b142213f47a439952527dc8de3e6aff
ssdeep
393216:cfZAtW94fKNeChKmIs+i9NR/6RSBotv2jZ6:cWW94fKNeChgI9f6REoWZ6

File size 13.7 MB ( 14394264 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-01-04 03:08:18 UTC ( 2 years, 3 months ago )
Last submission 2018-05-16 09:05:16 UTC ( 11 months, 1 week ago )
File names base.apk
com.amazing.rollingball-4.apk
rolling-ball.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!