× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b70b61f6fa1785361a479e44289200d48f6ad649d1a36502623603a7f37a69c4
File name: b70b61f6fa1785361a479e44289200d48f6ad649d1a36502623603a7f37a69c4
Detection ratio: 0 / 56
Analysis date: 2016-05-05 21:35:40 UTC ( 2 years, 6 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160505
AegisLab 20160505
AhnLab-V3 20160505
Alibaba 20160505
ALYac 20160505
Antiy-AVL 20160505
Arcabit 20160505
Avast 20160505
AVG 20160505
Avira (no cloud) 20160505
AVware 20160505
Baidu 20160505
Baidu-International 20160505
BitDefender 20160505
CAT-QuickHeal 20160505
ClamAV 20160504
CMC 20160504
Comodo 20160505
Cyren 20160505
DrWeb 20160505
Emsisoft 20160503
ESET-NOD32 20160505
F-Prot 20160505
F-Secure 20160505
Fortinet 20160505
GData 20160505
Ikarus 20160505
Jiangmin 20160505
K7AntiVirus 20160505
K7GW 20160505
Kaspersky 20160505
Kingsoft 20160505
Malwarebytes 20160505
McAfee 20160505
McAfee-GW-Edition 20160505
Microsoft 20160505
eScan 20160505
NANO-Antivirus 20160505
nProtect 20160504
Panda 20160505
Qihoo-360 20160505
Rising 20160505
Sophos AV 20160505
SUPERAntiSpyware 20160505
Symantec 20160505
Tencent 20160505
TheHacker 20160505
TotalDefense 20160505
TrendMicro 20160505
TrendMicro-HouseCall 20160505
VBA32 20160505
VIPRE 20160505
ViRobot 20160505
Yandex 20160502
Zillya 20160505
Zoner 20160505
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.finazzi.distquake. The internal version number of the application is 229. The displayed version string of the application is 5.4.11. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.INTERNET (full Internet access)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.finazzi.distquake.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
External libraries
com.google.android.maps
Activities
com.finazzi.distquake.MainActivity
com.google.android.gms.ads.AdActivity
com.finazzi.distquake.StatusActivity
com.finazzi.distquake.ConnectActivity
com.finazzi.distquake.OptionsActivity
com.finazzi.distquake.LogActivity
com.finazzi.distquake.Help
com.finazzi.distquake.FragmentManual
com.finazzi.distquake.ChatActivity
com.finazzi.distquake.ChatPreviewActivity
com.finazzi.distquake.ChatPersonalActivity
com.finazzi.distquake.ChatBannedActivity
com.finazzi.distquake.ChatMenuActivity
com.finazzi.distquake.ChartActivity
com.finazzi.distquake.ChartWaveActivity
com.finazzi.distquake.InAppActivity
com.finazzi.distquake.EarthquakeListActivity
com.finazzi.distquake.GlobeActivityAll
com.finazzi.distquake.WebViewActivity
com.finazzi.distquake.FragmentCompetition
com.finazzi.distquake.RegisterActivity
com.finazzi.distquake.ProfilePersonalActivity
com.finazzi.distquake.ProfileOtherActivity
com.finazzi.distquake.DelayListActivity
Services
com.finazzi.distquake.UpdateService
com.finazzi.distquake.PlayerService
com.finazzi.distquake.AppWidgetProviderActivity$UpdateWidgetService
com.finazzi.distquake.GcmIntentService
Receivers
com.finazzi.distquake.TimeAlarm
com.finazzi.distquake.BootListener
com.finazzi.distquake.UpgradeListener
com.finazzi.distquake.AppWidgetProviderActivity
com.finazzi.distquake.GcmBroadcastReceiver
Activity-related intent filters
com.finazzi.distquake.MainActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.finazzi.distquake.AppWidgetProviderActivity
actions: android.appwidget.action.APPWIDGET_UPDATE
com.finazzi.distquake.BootListener
actions: android.intent.action.BOOT_COMPLETED
com.finazzi.distquake.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.finazzi.distquakenoads
com.finazzi.distquake.UpgradeListener
actions: android.intent.action.MY_PACKAGE_REPLACED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
928
Uncompressed size
6468065
Highest datetime
2015-04-11 17:46:16
Lowest datetime
2014-08-30 12:47:14
Contained files by extension
png
762
xml
145
txt
12
dex
1
MF
1
RSA
1
ttf
1
wav
1
SF
1
Contained files by type
PNG
762
XML
145
unknown
20
DEX
1
File identification
MD5 e836eb6eeb71cb687291981df095e4d1
SHA1 51a665f59e4716eed4575d06065bcbab33891358
SHA256 b70b61f6fa1785361a479e44289200d48f6ad649d1a36502623603a7f37a69c4
ssdeep
98304:XzEJFx/z46duS+zgRMD+1rieprB6WvdyqPuKMCsF:XzO74cudg2q15nyqPxMCI

File size 3.9 MB ( 4042089 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android software-collection

VirusTotal metadata
First submission 2015-04-12 04:44:36 UTC ( 3 years, 7 months ago )
Last submission 2016-09-21 23:12:55 UTC ( 2 years, 2 months ago )
File names rede-terremoto.apk
116a36979fb8158d0e2a76eb51065e90009e7bcb32ac73370b92643a532a80699afb51ab800c1d6482a733821dbc8c12325ca335f5386a375f0beadca5bff2de
b70b61f6fa1785361a479e44289200d48f6ad649d1a36502623603a7f37a69c4
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.INTERNET:com.finazzi.distquake
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.net.conn.CONNECTIVITY_CHANGE
com.google.analytics.RADIO_POWERED
Opened files
/data/data/com.finazzi.distquake/files/gaClientId
/data/data/com.finazzi.distquake/files/gaInstallData
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://www.earthquakenetwork.it/mysql/distquake_upload_online_user.php
755F69643D373231393339393230
Accessed URIs
http://plus.google.com/
market://details