× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a55a97fbdbcfd776bb83d73fb377be9c13c5cf92054ac8d0b3d4527bbceb67b6
File name: WCJ3sd37X31t8pytyUVA20170719-12344-afnjph
Detection ratio: 0 / 62
Analysis date: 2017-07-19 18:55:31 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170719
AegisLab 20170719
AhnLab-V3 20170719
Alibaba 20170719
ALYac 20170719
Antiy-AVL 20170719
Arcabit 20170719
Avast 20170719
AVG 20170719
Avira (no cloud) 20170719
AVware 20170719
Baidu 20170719
BitDefender 20170719
Bkav 20170719
CAT-QuickHeal 20170719
ClamAV 20170719
CMC 20170719
Comodo 20170719
CrowdStrike Falcon (ML) 20170710
Cylance 20170719
Cyren 20170719
DrWeb 20170719
Emsisoft 20170719
Endgame 20170713
ESET-NOD32 20170719
F-Prot 20170719
F-Secure 20170719
Fortinet 20170719
GData 20170719
Ikarus 20170719
Sophos ML 20170607
Jiangmin 20170719
K7AntiVirus 20170719
K7GW 20170719
Kaspersky 20170719
Kingsoft 20170719
Malwarebytes 20170719
MAX 20170719
McAfee 20170719
McAfee-GW-Edition 20170719
Microsoft 20170719
eScan 20170719
NANO-Antivirus 20170719
nProtect 20170719
Palo Alto Networks (Known Signatures) 20170719
Panda 20170719
Qihoo-360 20170719
Rising 20170719
SentinelOne (Static ML) 20170718
Sophos AV 20170719
SUPERAntiSpyware 20170719
Symantec 20170719
Symantec Mobile Insight 20170719
Tencent 20170719
TheHacker 20170719
TotalDefense 20170719
TrendMicro 20170719
TrendMicro-HouseCall 20170719
Trustlook 20170719
VBA32 20170719
VIPRE 20170719
ViRobot 20170719
Webroot 20170719
WhiteArmor 20170713
Yandex 20170719
Zillya 20170719
ZoneAlarm by Check Point 20170719
Zoner 20170719
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.igg.android.lordsmobile. The internal version number of the application is 100. The displayed version string of the application is 1.43. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.igg.android.lordsmobile.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.igg.iggsdkbusiness.IGGSDKPlugin
com.unity3d.player.VideoPlayer
com.outlinegames.unibill.PurchaseActivity
com.igg.iggsdkbusiness.IGGWebView
com.igg.iggsdkbusiness.TapjoyView
com.prime31.ReauthorizationProxy
com.facebook.FacebookActivity
com.igg.android.wegamers.auth.AuthActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
Services
com.igg.iggsdkbusiness.GCMIntentService
com.unity3d.plugin.downloader.UnityDownloaderService
Receivers
com.igg.iggsdkbusiness.GCMBroadcastReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.igg.iggsdkbusiness.LocalNotificationReceiver
com.igg.iggsdkbusiness.AuthRequestReceiver
com.unity3d.plugin.downloader.UnityAlarmReceiver
Activity-related intent filters
com.igg.android.wegamers.auth.AuthActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.igg.iggsdkbusiness.IGGSDKPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.igg.iggsdkbusiness.AuthRequestReceiver
actions: com.igg.android.game.authreceiver
com.igg.iggsdkbusiness.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.igg.android.lordsmobile
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
477
Uncompressed size
33836921
Highest datetime
2017-05-26 17:51:26
Lowest datetime
2015-08-28 10:44:10
Contained files by extension
png
319
xml
137
dll
7
so
5
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
319
XML
137
unknown
9
Portable Executable
6
ELF
5
DEX
1
File identification
MD5 8deb05fc3e7a03cc1e28a43297f2482a
SHA1 ac468779150331e719bd27286bccc59104f724c5
SHA256 a55a97fbdbcfd776bb83d73fb377be9c13c5cf92054ac8d0b3d4527bbceb67b6
ssdeep
393216:RHa3U8vRrBFpi3tyt4Av1o5jHYvDxgu0rOI2KIJ15JpqH0LLxC:ivlBqYtP1ol9atJ1j8UxC

File size 15.5 MB ( 16236138 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-05-26 12:39:29 UTC ( 1 year, 8 months ago )
Last submission 2018-10-13 06:18:59 UTC ( 4 months, 1 week ago )
File names com.igg.android.lordsmobile.apk
lords-mobile.apk
WCJ3sd37X31t8pytyUVA20170719-12344-afnjph
APKupdate_com_igg_android_lordsmobile-100.apk
base.apk
lords-mobile-1.43.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!