× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b86c1ab7664ea216a38b7438dd7d44b1d92550ddbc3a93dc8cfea4f9d16c951f
File name: tw.mobileapp.qrcode.banner-2.apk
Detection ratio: 0 / 56
Analysis date: 2016-10-22 07:48:19 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20161022
AegisLab 20161022
AhnLab-V3 20161021
Alibaba 20161021
ALYac 20161022
Antiy-AVL 20161022
Arcabit 20161022
Avast 20161022
AVG 20161022
Avira (no cloud) 20161022
AVware 20161022
Baidu 20161022
BitDefender 20161022
Bkav 20161021
CAT-QuickHeal 20161021
ClamAV 20161022
CMC 20161022
Comodo 20161022
CrowdStrike Falcon (ML) 20160725
Cyren 20161022
DrWeb 20161022
Emsisoft 20161022
ESET-NOD32 20161021
F-Prot 20161022
F-Secure 20161021
Fortinet 20161022
GData 20161022
Ikarus 20161021
Sophos ML 20161018
Jiangmin 20161022
K7AntiVirus 20161022
K7GW 20161022
Kaspersky 20161022
Kingsoft 20161022
Malwarebytes 20161022
McAfee 20161022
McAfee-GW-Edition 20161022
Microsoft 20161022
eScan 20161022
NANO-Antivirus 20161022
nProtect 20161022
Panda 20161021
Qihoo-360 20161022
Rising 20161022
Sophos AV 20161022
SUPERAntiSpyware 20161022
Symantec 20161022
Tencent 20161022
TheHacker 20161020
TotalDefense 20161021
TrendMicro 20161022
TrendMicro-HouseCall 20161022
VBA32 20161021
VIPRE 20161022
ViRobot 20161022
Yandex 20161021
Zillya 20161021
Zoner 20161022
The file being studied is Android related! APK Android file more specifically. The application's main package name is tw.mobileapp.qrcode.banner. The internal version number of the application is 174. The displayed version string of the application is 1.7.4. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CAMERA (take pictures and videos)
Activities
tw.mobileapp.qrcode.banner.CaptureActivity
tw.mobileapp.qrcode.banner.CaptureDecodeActivity
tw.mobileapp.qrcode.banner.QRIntroduction
tw.mobileapp.qrcode.banner.HistoryView
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Activity-related intent filters
tw.mobileapp.qrcode.banner.CaptureActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
228
Uncompressed size
5412333
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
196
xml
26
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
196
XML
25
unknown
6
DEX
1
File identification
MD5 05df20a2cc2e611d64215e5043c460cc
SHA1 1128073b87f50e63767bba17938d620c1bcde489
SHA256 b86c1ab7664ea216a38b7438dd7d44b1d92550ddbc3a93dc8cfea4f9d16c951f
ssdeep
49152:1lc14XMZ2h2K82XiduF4jWmSELKgQ5YVBdR8IN:1ulZ27nibWp/gXfdOIN

File size 2.0 MB ( 2095599 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-10-21 09:01:30 UTC ( 2 years, 3 months ago )
Last submission 2018-01-15 03:06:57 UTC ( 1 year, 1 month ago )
File names gwrdiK8nruS7MkNnfpyH20161103-23844-5f9hts
qr-code-reader.apk
qr-code-reader.apk
pkg.apk
tw.mobileapp.qrcode.banner-2.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:tw.mobileapp.qrcode.banner
android.permission.INTERNET:tw.mobileapp.qrcode.banner
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
https:/googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache
/data/data/tw.mobileapp.qrcode.banner/databases/com.google.android.gms.ads.db
Accessed files
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.tmp
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.dex
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads
http://www.example.com
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html