× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: aabd086878c69de2c3019cd981cbb673062e716f05dcee7a523949b6dfeaa0d4
File name: com.tappocket.monstercity.apk
Detection ratio: 0 / 60
Analysis date: 2018-10-15 11:40:11 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20181015
AegisLab 20181015
AhnLab-V3 20181015
Alibaba 20180921
ALYac 20181015
Antiy-AVL 20181015
Arcabit 20181015
Avast 20181015
Avast-Mobile 20181015
AVG 20181015
Avira (no cloud) 20181015
Babable 20180918
Baidu 20181015
BitDefender 20181015
Bkav 20181014
CAT-QuickHeal 20181013
ClamAV 20181015
CMC 20181015
Comodo 20181015
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20181015
Cyren 20181015
DrWeb 20181015
eGambit 20181015
Emsisoft 20181015
Endgame 20180730
ESET-NOD32 20181015
F-Prot 20181015
F-Secure 20181015
Fortinet 20181015
GData 20181015
Ikarus 20181015
Sophos ML 20180717
Jiangmin 20181015
K7AntiVirus 20181015
K7GW 20181015
Kaspersky 20181015
Kingsoft 20181015
Malwarebytes 20181015
MAX 20181015
McAfee 20181015
McAfee-GW-Edition 20181015
Microsoft 20181015
eScan 20181015
NANO-Antivirus 20181015
Palo Alto Networks (Known Signatures) 20181015
Panda 20181014
Qihoo-360 20181015
Rising 20181015
SentinelOne (Static ML) 20181011
Sophos AV 20181015
SUPERAntiSpyware 20181015
Symantec 20181015
Symantec Mobile Insight 20181001
TACHYON 20181015
Tencent 20181015
TheHacker 20181011
TotalDefense 20181015
TrendMicro 20181015
TrendMicro-HouseCall 20181015
Trustlook 20181015
VBA32 20181015
ViRobot 20181015
Webroot 20181015
Yandex 20181012
Zillya 20181012
ZoneAlarm by Check Point 20181015
Zoner 20181014
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tappocket.monstercity. The internal version number of the application is 1505395446. The displayed version string of the application is 7.35. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
com.tappocket.monstercity.permission.RECEIVE_ADM_MESSAGE (Unknown permission from android reference)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
com.amazon.device.messaging.permission.RECEIVE (Unknown permission from android reference)
Activities
com.apportable.activity.VerdeActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.LoginActivity
Services
com.apportable.adm.ADMMessageHandler
com.apportable.media.AudioManagerService
com.apportable.notifications.LocalNotificationService
com.apportable.iap.BillingService
com.parse.PushService
Receivers
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
com.apportable.notifications.NotificationsBootReceiver
com.apportable.notifications.NotificationsAlarmReceiver
com.apportable.iap.BillingReceiver
com.parse.ParseBroadcastReceiver
com.parsebridge.ParseReceiverIntent
Activity-related intent filters
com.apportable.activity.VerdeActivity
actions: android.intent.action.VIEW, android.intent.action.MAIN, android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE, android.intent.category.LAUNCHER
Receiver-related intent filters
com.apportable.notifications.NotificationsBootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
com.parsebridge.ParseReceiverIntent
actions: com.tappocket.monstercity
com.parse.ParseBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
actions: com.amazon.device.messaging.intent.REGISTRATION, com.amazon.device.messaging.intent.RECEIVE
categories: com.tappocket.monstercity
com.apportable.iap.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3363
Uncompressed size
21705488
Highest datetime
2017-09-14 19:24:08
Lowest datetime
2014-07-17 18:21:32
Contained files by extension
png
807
xml
33
mp3
30
jpg
8
txt
3
m4a
1
fnt
1
Contained files by type
PNG
807
XML
148
OGG
31
JPG
8
unknown
6
File identification
MD5 7c1547bd493304c6120f8e4661001322
SHA1 96f50f8eeb6246beeaed77ad4aa1df44feda0a53
SHA256 aabd086878c69de2c3019cd981cbb673062e716f05dcee7a523949b6dfeaa0d4
ssdeep
1572864:3tX4h2DyI4JZAQkF/XHGVx6tSKsgeZWiAIJrJK0Jr+4Lrmi:3tX4h2M7A3/Wv6tSvgUlrJjZLrmi

File size 66.8 MB ( 70046783 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (50.4%)
Java Archive (13.9%)
BlueEyes Animation (12.9%)
Sweet Home 3D design (generic) (10.0%)
Konfabulator widget (7.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-09-15 05:30:46 UTC ( 1 year, 6 months ago )
Last submission 2018-12-12 14:08:34 UTC ( 3 months, 1 week ago )
File names aosaynJWAA9m6Rl65utZbiBsIgenPpQei7RE4yUBI52Os3RWyNrLqCPLBn4uIRg
asomvJwNrOz6bAtl044g5
monster-city.apk
com.tappocket.monstercity.apk
osmaXUmRHH5aSHUKLmPEpoOu1wTzW25SIzwiF5M9p2JNzsD3
amosjMMjFgPdanggr0jcXlNFdluaPIrdVAynXNtnP
aabd086878c69de2c3019cd981cbb673062e716f05dcee7a523949b6dfeaa0d4.file
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!