× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: af04bc670f02c04e8372ccd0b507935c3a2d9aad15aba42d4d58f46adf183c0b
File name: 801214_3e114c_com.lego.bricksmore-1522.apk
Detection ratio: 0 / 60
Analysis date: 2017-05-29 16:14:03 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170529
AegisLab 20170529
AhnLab-V3 20170529
Alibaba 20170527
ALYac 20170529
Antiy-AVL 20170529
Arcabit 20170529
Avast 20170529
AVG 20170529
Avira (no cloud) 20170529
AVware 20170529
Baidu 20170527
BitDefender 20170529
CAT-QuickHeal 20170529
ClamAV 20170529
CMC 20170528
Comodo 20170529
CrowdStrike Falcon (ML) 20170420
Cyren 20170529
DrWeb 20170529
Emsisoft 20170529
Endgame 20170515
ESET-NOD32 20170529
F-Prot 20170529
F-Secure 20170529
Fortinet 20170529
GData 20170529
Ikarus 20170529
Sophos ML 20170519
Jiangmin 20170529
K7AntiVirus 20170529
K7GW 20170529
Kaspersky 20170529
Kingsoft 20170529
Malwarebytes 20170529
McAfee 20170529
McAfee-GW-Edition 20170529
Microsoft 20170529
eScan 20170529
NANO-Antivirus 20170529
nProtect 20170529
Palo Alto Networks (Known Signatures) 20170529
Panda 20170529
Qihoo-360 20170529
Rising 20170529
SentinelOne (Static ML) 20170516
Sophos AV 20170529
SUPERAntiSpyware 20170529
Symantec 20170529
Symantec Mobile Insight 20170526
Tencent 20170529
TheHacker 20170528
TotalDefense 20170529
TrendMicro 20170529
TrendMicro-HouseCall 20170525
Trustlook 20170529
VBA32 20170529
VIPRE 20170529
ViRobot 20170529
Webroot 20170529
WhiteArmor 20170524
Yandex 20170526
Zillya 20170529
ZoneAlarm by Check Point 20170529
Zoner 20170529
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.lego.bricksmore. The internal version number of the application is 1522. The displayed version string of the application is 6.3.1522. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.INTERNET (full Internet access)
android.permission.READ_PHONE_STATE (read phone state and identity)
Activities
com.prime31.UnityPlayerNativeActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.flurry.android.CatalogActivity
Activity-related intent filters
com.prime31.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.flurry.android.CatalogActivity
actions: com.prime31.flurry.intent
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
937
Uncompressed size
246657109
Highest datetime
2017-02-06 16:40:18
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
7
xml
6
so
6
dat
2
map
1
MF
1
RSA
1
dex
1
ini
1
SF
1
Contained files by type
unknown
916
XML
7
PNG
7
ELF
6
DEX
1
File identification
MD5 6ce13f29c9292adf8b60504486bbc4ab
SHA1 fffad5f23a399af3375ba61990636440145f9f64
SHA256 af04bc670f02c04e8372ccd0b507935c3a2d9aad15aba42d4d58f46adf183c0b
ssdeep
1572864:ui2N9pt5MaKJ1d5aLaGoweYAbdMx9JqKNB0I+HvUeSX:ui2dtod5WaGoJ7JMxfqKL+HvrSX

File size 67.6 MB ( 70844768 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (52.7%)
foobar2000 component (29.0%)
ZIP compressed archive (14.5%)
PrintFox/Pagefox bitmap (var. P) (3.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2017-02-09 02:58:56 UTC ( 1 year, 11 months ago )
Last submission 2018-12-31 19:23:51 UTC ( 2 weeks, 3 days ago )
File names lego-app4.apk
com.lego.bricksmore-1.apk
801214_3e114c_com.lego.bricksmore-1522.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!