× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: af4076a687c97f340dbe8663c189a907fd209ca76435a6808c06d26832bef96a
File name: af4076a687c97f340dbe8663c189a907fd209ca76435a6808c06d26832bef96a
Detection ratio: 0 / 57
Analysis date: 2016-05-07 04:43:59 UTC ( 2 years, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160507
AegisLab 20160506
AhnLab-V3 20160506
Alibaba 20160506
ALYac 20160507
Antiy-AVL 20160507
Arcabit 20160507
Avast 20160507
AVG 20160507
Avira (no cloud) 20160506
AVware 20160507
Baidu 20160506
Baidu-International 20160506
BitDefender 20160507
Bkav 20160506
CAT-QuickHeal 20160506
ClamAV 20160507
CMC 20160506
Comodo 20160507
Cyren 20160507
DrWeb 20160507
Emsisoft 20160503
ESET-NOD32 20160507
F-Prot 20160507
F-Secure 20160507
Fortinet 20160507
GData 20160507
Ikarus 20160506
Jiangmin 20160507
K7AntiVirus 20160506
K7GW 20160507
Kaspersky 20160507
Kingsoft 20160507
Malwarebytes 20160507
McAfee 20160507
McAfee-GW-Edition 20160506
Microsoft 20160507
eScan 20160507
NANO-Antivirus 20160507
nProtect 20160504
Panda 20160506
Qihoo-360 20160507
Rising 20160507
Sophos AV 20160507
SUPERAntiSpyware 20160507
Symantec 20160507
Tencent 20160507
TheHacker 20160505
TotalDefense 20160507
TrendMicro 20160507
TrendMicro-HouseCall 20160507
VBA32 20160505
VIPRE 20160507
ViRobot 20160507
Yandex 20160506
Zillya 20160507
Zoner 20160507
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aim.racing. The internal version number of the application is 20033. The displayed version string of the application is 4.03. The minimum Android API level for the application to run (MinSDKVersion) is 10. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.VideoPlayer
com.unity3d.player.UnityPlayerNativeActivity
com.google.android.gms.ads.AdActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.amazon.device.ads.AdActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.outlinegames.unibill.PurchaseActivity
com.google.games.bridge.NativeBridgeActivity
com.vungle.publisher.FullScreenAdActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.vungle.publisher.VungleService
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
696
Uncompressed size
113615398
Highest datetime
2015-05-27 17:24:18
Lowest datetime
2015-03-24 12:41:18
Contained files by extension
png
225
xml
39
dll
19
so
4
dex
1
MF
1
RSA
1
txt
1
SF
1
Contained files by type
unknown
408
PNG
225
XML
39
Portable Executable
19
ELF
4
DEX
1
Compressed bundles
File identification
MD5 a1c52997c19b34a9cefbf9581e9dc5a2
SHA1 c26e8ece97ec557cc5856e3fbfa38282a2c3dc4f
SHA256 af4076a687c97f340dbe8663c189a907fd209ca76435a6808c06d26832bef96a
ssdeep
786432:I5VpqUOuzFDfoAyaAQ5uCJjL6971325w6+QFYCuBhiT89NNix:I5TqUkrQ5uChL0g2BM89NNE

File size 38.1 MB ( 39975770 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-05-28 00:58:13 UTC ( 3 years, 8 months ago )
Last submission 2016-06-16 15:18:10 UTC ( 2 years, 8 months ago )
File names package.apk
extreme-car-driving-simulator.apk
af4076a687c97f340dbe8663c189a907fd209ca76435a6808c06d26832bef96a
Advanced heuristic and reputation engines
TrendMicro-HouseCall
TrendMicro's heuristic engine has flagged this file as: Suspicious_GEN.F47V0329.

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!