× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: adb95bb84367d55a3990849ae86a92057a3660d5c1c89e53c844f0ef67403f15
File name: com.sellaring.engine.service_22.apk
Detection ratio: 0 / 44
Analysis date: 2012-10-31 15:35:57 UTC ( 5 years ago ) View latest
Antivirus Result Update
Yandex 20121031
AhnLab-V3 20121031
AntiVir 20121031
Antiy-AVL 20121027
Avast 20121031
AVG 20121031
BitDefender 20121031
ByteHero 20121031
CAT-QuickHeal 20121031
ClamAV 20121031
Commtouch 20121031
Comodo 20121031
DrWeb 20121031
Emsisoft 20121031
eSafe 20121028
ESET-NOD32 20121031
F-Prot 20121030
F-Secure 20121031
Fortinet 20121031
GData 20121031
Ikarus 20121031
Jiangmin 20121031
K7AntiVirus 20121030
Kaspersky 20121031
Kingsoft 20121028
McAfee 20121031
McAfee-GW-Edition 20121031
Microsoft 20121031
eScan 20121031
Norman 20121031
nProtect 20121031
Panda 20121031
PCTools 20121031
Rising 20121031
Sophos AV 20121031
SUPERAntiSpyware 20121031
Symantec 20121031
TheHacker 20121031
TotalDefense 20121030
TrendMicro 20121031
TrendMicro-HouseCall 20121031
VBA32 20121030
VIPRE 20121031
ViRobot 20121031
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.sellaring.engine.service. The internal version number of the application is 22. The displayed version string of the application is 0.1.13. The minimum Android API level for the application to run (MinSDKVersion) is 5.
Risk summary
The studied DEX file makes use of API reflection
The studied DEX file makes use of cryptographic functions
Permissions that allow the application to perform calls
Permissions that allow the application to manipulate your location
Permissions that allow the application to perform payments
Permissions that allow the application to access Internet
Permissions that allow the application to access private information
Other permissions that could be considered as dangerous in certain scenarios
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.INTERNET (full Internet access)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.BROADCAST_PACKAGE_REMOVED (send package removed broadcast)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Permission-related API calls
ACCESS_FINE_LOCATION
READ_PHONE_STATE
WAKE_LOCK
VIBRATE
INTERNET
Activities
com.sellaring.engine.activities.EngineActivity
com.sellaring.engine.activities.PostCallActivity
Services
com.sellaring.engine.service.EngineService
Receivers
com.sellaring.engine.service.PackageRemovedReceiver
com.sellaring.engine.service.PhoneStateReceiver
com.sellaring.engine.alarm.AlarmRSSReceiver
com.sellaring.engine.alarm.AlarmGetContentReceiver
com.sellaring.engine.alarm.AlarmGPSReceiver
com.sellaring.engine.alarm.AlarmSyncFriendsReceiver
com.sellaring.engine.alarm.AlarmNotificationReceiver
com.sellaring.engine.alarm.AlarmGetConfigurationReceiver
com.sellaring.engine.alarm.RestartAlarmServiceReceiver
com.sellaring.engine.alarm.AlarmGpsLocationUpdatesReceiver
Providers
com.sellaring.engine.data.SellARingDataProvider
Receiver-related intent filters
com.sellaring.engine.service.PackageRemovedReceiver
actions: android.intent.action.PACKAGE_REMOVED
com.sellaring.engine.alarm.RestartAlarmServiceReceiver
actions: android.intent.action.BOOT_COMPLETED
com.sellaring.engine.service.PhoneStateReceiver
actions: android.intent.action.PHONE_STATE, android.intent.action.NEW_OUTGOING_CALL
Application certificate information
Application bundle files
Interesting strings
File identification
MD5 e2af3c3a05f2e23db2913091ccaeeaec
SHA1 3c254a8d7947c72d97b4646ad9c4da6de4df9652
SHA256 adb95bb84367d55a3990849ae86a92057a3660d5c1c89e53c844f0ef67403f15
ssdeep
12288:sDvKVTl3yWZrFESCZwaYKfnxB9vobbfUspVDElLqRGmc:3VFl3XcYE/vobbf7EJqRG

File size 478.2 KB ( 489662 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2012-02-11 02:11:49 UTC ( 5 years, 9 months ago )
Last submission 2014-04-07 17:53:06 UTC ( 3 years, 7 months ago )
File names com.sellaring.engine.service_22.apk
e2af3c3a05f2e23db2913091ccaeeaec.apk
com.sellaring.engine.service_22.apk
com.sellaring.engine.service.apk
ExifTool file metadata
MIMEType
application/zip

ZipRequiredVersion
20

ZipCRC
0xe3cb9aba

FileType
ZIP

ZipCompression
Deflated

ZipUncompressedSize
708

ZipCompressedSize
306

FileAccessDate
2014:04:07 18:57:21+01:00

ZipFileName
res/drawable/background.xml

ZipBitFlag
0x0008

FileCreateDate
2014:04:07 18:57:21+01:00

ZipModifyDate
2011:12:29 14:44:15

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Accessed URIs
content://sellaring/apps