× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b4ec4fdabeb7ec707bc5d2947910aa69236f722a2d4bac1d7861ac740aef9508
File name: 824158_ca1382_gkey.wholike-60.apk
Detection ratio: 0 / 61
Analysis date: 2017-04-20 12:43:42 UTC ( 1 year, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170420
AegisLab 20170420
AhnLab-V3 20170420
Alibaba 20170420
ALYac 20170420
Antiy-AVL 20170420
Arcabit 20170420
Avast 20170420
AVG 20170420
Avira (no cloud) 20170420
AVware 20170420
Baidu 20170420
BitDefender 20170420
Bkav 20170420
CAT-QuickHeal 20170420
ClamAV 20170420
CMC 20170420
Comodo 20170420
CrowdStrike Falcon (ML) 20170419
Cyren 20170420
DrWeb 20170420
Emsisoft 20170420
Endgame 20170419
ESET-NOD32 20170420
F-Prot 20170420
F-Secure 20170420
Fortinet 20170420
GData 20170420
Ikarus 20170420
Sophos ML 20170413
Jiangmin 20170420
K7AntiVirus 20170420
K7GW 20170420
Kaspersky 20170420
Kingsoft 20170420
Malwarebytes 20170420
McAfee 20170420
McAfee-GW-Edition 20170419
Microsoft 20170420
eScan 20170420
NANO-Antivirus 20170420
nProtect 20170420
Palo Alto Networks (Known Signatures) 20170420
Panda 20170419
Qihoo-360 20170420
Rising 20170420
SentinelOne (Static ML) 20170330
Sophos AV 20170420
SUPERAntiSpyware 20170420
Symantec 20170419
Symantec Mobile Insight 20170414
Tencent 20170420
TheHacker 20170419
TotalDefense 20170420
TrendMicro 20170420
TrendMicro-HouseCall 20170420
Trustlook 20170420
VBA32 20170420
VIPRE 20170420
ViRobot 20170420
Webroot 20170420
WhiteArmor 20170409
Yandex 20170419
Zillya 20170418
ZoneAlarm by Check Point 20170420
Zoner 20170420
The file being studied is Android related! APK Android file more specifically. The application's main package name is gkey.wholike. The internal version number of the application is 60. The displayed version string of the application is 6.0. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.QUICKBOOT_POWERON (Unknown permission from android reference)
gkey.wholike.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
gkey.wholike.MyActivity
gkey.wholike.GlavActivity
com.google.android.gms.ads.AdActivity
gkey.wholike.allClass
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
com.google.android.gms.appinvite.PreviewActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.tagmanager.TagManagerPreviewActivity
Services
gkey.wholike.MyService
gkey.wholike.FirebaseMessageService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.cast.framework.media.MediaNotificationService
com.google.android.gms.cast.framework.ReconnectionService
com.google.firebase.iid.FirebaseInstanceIdService
com.google.android.gms.measurement.AppMeasurementService
com.google.firebase.messaging.FirebaseMessagingService
com.google.android.gms.tagmanager.TagManagerService
Receivers
gkey.wholike.AvtoZapusk
com.google.android.gms.cast.framework.media.MediaIntentReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
gkey.wholike.FirebaseMessageService
actions: com.google.firebase.MESSAGING_EVENT
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
Activity-related intent filters
gkey.wholike.GlavActivity
actions: android.intent.action.MAIN
categories: android.intent.category.DEFAULT, android.intent.category.LAUNCHER
com.google.android.gms.tagmanager.TagManagerPreviewActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.google.android.gms.appinvite.PreviewActivity
actions: com.google.android.gms.appinvite.ACTION_PREVIEW
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: gkey.wholike
gkey.wholike.AvtoZapusk
actions: android.intent.action.MAIN, android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON, com.htc.intent.action.QUICKBOOT_POWERON
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1276
Uncompressed size
5132280
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
910
xml
85
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
910
XML
84
unknown
5
DEX
1
File identification
MD5 9ebb647c1f8d5dfd46c424d4515b767e
SHA1 5bc8bb20879e1ca42af37dcea2c9a2d1c96d12e2
SHA256 b4ec4fdabeb7ec707bc5d2947910aa69236f722a2d4bac1d7861ac740aef9508
ssdeep
98304:5sngJPb+zyzHTYOrtYB6Ej9MgoCrYjgjTbmZQP:5snY6WHT3BYvjWgPrYjxZQP

File size 3.6 MB ( 3773936 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android

VirusTotal metadata
First submission 2017-02-10 00:51:32 UTC ( 2 years, 1 month ago )
Last submission 2017-04-20 12:43:42 UTC ( 1 year, 11 months ago )
File names 824158_ca1382_gkey.wholike-60.apk
LikeObmen60.apk
757098_7e916c_likeobmen60.apk
gkey.wholike.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!