× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a69c3f34d0f84a73c4355f6d0da2f2b6e5f075c2eae0d5624128e7ee81523aa8
File name: me.lyft.android_5.64.3.1548462497-1548462497_minAPI21_arm64-v8a_a...
Detection ratio: 0 / 59
Analysis date: 2019-01-30 03:59:42 UTC ( 3 months, 3 weeks ago ) View latest
Antivirus Result Update
Acronis 20190128
Ad-Aware 20190130
AegisLab 20190130
AhnLab-V3 20190129
Alibaba 20180921
ALYac 20190130
Antiy-AVL 20190130
Arcabit 20190130
Avast 20190130
Avast-Mobile 20190129
AVG 20190130
Avira (no cloud) 20190130
Babable 20180918
Baidu 20190129
BitDefender 20190130
Bkav 20190129
CAT-QuickHeal 20190129
ClamAV 20190129
CMC 20190129
Comodo 20190130
CrowdStrike Falcon (ML) 20181023
Cybereason 20190109
Cyren 20190130
DrWeb 20190130
eGambit 20190130
Emsisoft 20190130
Endgame 20181108
ESET-NOD32 20190130
F-Prot 20190130
F-Secure 20190130
Fortinet 20190130
GData 20190130
Sophos ML 20181128
Jiangmin 20190130
K7AntiVirus 20190129
K7GW 20190129
Kaspersky 20190130
Kingsoft 20190130
Malwarebytes 20190130
MAX 20190130
McAfee 20190130
McAfee-GW-Edition 20190129
Microsoft 20190130
eScan 20190130
NANO-Antivirus 20190130
Palo Alto Networks (Known Signatures) 20190130
Panda 20190129
Qihoo-360 20190130
Rising 20190130
SentinelOne (Static ML) 20190124
Sophos AV 20190130
SUPERAntiSpyware 20190123
Symantec 20190130
TACHYON 20190130
Tencent 20190130
TheHacker 20190129
TotalDefense 20190129
Trapmine 20190123
TrendMicro 20190130
TrendMicro-HouseCall 20190130
Trustlook 20190130
VBA32 20190129
VIPRE 20190130
ViRobot 20190129
Webroot 20190130
Yandex 20190129
Zillya 20190131
ZoneAlarm by Check Point 20190130
Zoner 20190128
The file being studied is Android related! APK Android file more specifically. The application's main package name is me.lyft.android. The internal version number of the application is 1548462497. The displayed version string of the application is 5.64.3.1548462497. The minimum Android API level for the application to run (MinSDKVersion) is 21. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
me.lyft.android.permission.C2D_MESSAGE (C2DM permission.)
android.permission.READ_CALENDAR (read calendar events)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.CAMERA (take pictures and videos)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.BLUETOOTH_ADMIN (bluetooth administration)
android.permission.BLUETOOTH (create Bluetooth connections)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_CONTACTS (read contact data)
android.permission.FOREGROUND_SERVICE (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
me.lyft.android.ui.MainActivity
io.card.payment.CardIOActivity
io.card.payment.DataEntryActivity
com.braintreepayments.api.BraintreeBrowserSwitchActivity
androidx.slice.compat.SlicePermissionActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.google.android.gms.ads.AdActivity
com.squareup.leakcanary.internal.DisplayLeakActivity
com.squareup.leakcanary.internal.RequestStoragePermissionActivity
com.braintreepayments.api.AndroidPayActivity
com.braintreepayments.api.GooglePaymentActivity
com.braintreepayments.api.threedsecure.ThreeDSecureWebViewActivity
Services
com.lyft.auth.RemoteAuthAndroidService
com.lyft.android.passenger.locationfeedback.gcm.LocationFeedbackNotificationService
com.lyft.android.gcm.services.GcmService
com.lyft.android.gcm.token.GcmTokenChangedListenerService
com.lyft.android.ThreatMetrixIntentService
com.lyft.android.appservice.AppService
com.google.firebase.messaging.FirebaseMessagingService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.components.ComponentDiscoveryService
com.google.firebase.iid.FirebaseInstanceIdService
com.squareup.leakcanary.internal.HeapAnalyzerService
com.squareup.leakcanary.DisplayLeakService
com.braintreepayments.api.internal.AnalyticsIntentService
Receivers
com.lyft.android.geofences.GeofenceReceiver
me.lyft.android.receivers.MultiInstallBroadcastReceiver
com.google.android.gms.wallet.EnableWalletOptimizationReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
me.lyft.android.ui.LyftSliceProvider
com.google.firebase.provider.FirebaseInitProvider
com.squareup.leakcanary.internal.LeakCanaryFileProvider
Service-related intent filters
com.lyft.android.gcm.token.GcmTokenChangedListenerService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.lyft.auth.RemoteAuthAndroidService
actions: com.lyft.android.LYFT_INTERNAL_AUTH
com.lyft.android.gcm.services.GcmService
actions: com.google.firebase.MESSAGING_EVENT
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
Activity-related intent filters
com.braintreepayments.api.BraintreeBrowserSwitchActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
me.lyft.android.ui.MainActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.squareup.leakcanary.internal.DisplayLeakActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.lyft.android.geofences.GeofenceReceiver
actions: com.lyft.android.googleawareness.ACTION_FENCE
com.google.android.gms.wallet.EnableWalletOptimizationReceiver
actions: com.google.android.gms.wallet.ENABLE_WALLET_OPTIMIZATION
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: me.lyft.android
me.lyft.android.receivers.MultiInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
4526
Uncompressed size
33893477
Highest datetime
2019-01-25 16:39:20
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
dex
9
xml
1
txt
1
Contained files by type
unknown
990
DEX
9
XML
1
File identification
MD5 3acab4ad427961f80361c31f2c4d8598
SHA1 7eb86a59f332e93fec70083b6039c1fd7c8e9700
SHA256 a69c3f34d0f84a73c4355f6d0da2f2b6e5f075c2eae0d5624128e7ee81523aa8
ssdeep
786432:wX8R/WDs6feUKFcg3ZZpPpqU+BQbdZV7mbQwcTMnceI:wsRO46pQcgpT+BQbbNvtMnceI

File size 29.5 MB ( 30979665 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID SPSS Extension (45.4%)
Java Archive (21.9%)
Sweet Home 3D design (generic) (15.9%)
Google Earth saved working session (9.0%)
ZIP compressed archive (6.0%)
Tags
apk android via-tor

VirusTotal metadata
First submission 2019-01-30 03:59:42 UTC ( 3 months, 3 weeks ago )
Last submission 2019-04-06 09:21:35 UTC ( 1 month, 2 weeks ago )
File names lyft-5-64-3-1548462497.apk
lyft-on-demand-ridesharing.apk
me.lyft.android_5.64.3.1548462497-1548462497_minAPI21_arm64-v8a_armeabi_armeabi-v7a_mips_x86_x86_64__nodpi__APKdot.com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!