× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b88c15cea34cb46bcada445efeeba98d48338e13cda60da3f767c35b0d9b5b73
File name: stickman-downhill-motocross-2.0.apk
Detection ratio: 0 / 56
Analysis date: 2016-11-09 00:46:58 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20161109
AegisLab 20161108
AhnLab-V3 20161108
Alibaba 20161108
ALYac 20161109
Antiy-AVL 20161109
Arcabit 20161109
Avast 20161109
AVG 20161109
Avira (no cloud) 20161108
AVware 20161109
Baidu 20161107
BitDefender 20161108
Bkav 20161108
CAT-QuickHeal 20161108
ClamAV 20161109
CMC 20161108
Comodo 20161108
CrowdStrike Falcon (ML) 20161024
Cyren 20161109
DrWeb 20161109
Emsisoft 20161109
ESET-NOD32 20161109
F-Prot 20161110
F-Secure 20161109
Fortinet 20161109
GData 20161109
Ikarus 20161108
Sophos ML 20161018
Jiangmin 20161108
K7AntiVirus 20161108
K7GW 20161109
Kaspersky 20161109
Kingsoft 20161109
Malwarebytes 20161109
McAfee 20161109
McAfee-GW-Edition 20161109
Microsoft 20161108
eScan 20161108
NANO-Antivirus 20161108
nProtect 20161109
Panda 20161108
Qihoo-360 20161109
Rising 20161109
Sophos AV 20161109
SUPERAntiSpyware 20161109
Symantec 20161109
Tencent 20161109
TheHacker 20161106
TotalDefense 20161108
TrendMicro 20161110
TrendMicro-HouseCall 20161109
VBA32 20161108
VIPRE 20161108
ViRobot 20161108
Yandex 20161108
Zillya 20161108
Zoner 20161108
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.djinnworks.StickmanDownhillMotocross. The internal version number of the application is 11. The displayed version string of the application is 2.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 16.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.djinnworks.framework.App
com.amazon.device.ads.AdActivity
com.facebook.LoginActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.google.ads.AdActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.startapp.android.publish.list3d.List3DActivity
com.startapp.android.publish.AppWallActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.chartboost.sdk.CBImpressionActivity
com.google.android.gms.ads.AdActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.vungle.publisher.FullScreenAdActivity
com.heyzap.sdk.ads.HeyzapInterstitialActivity
com.heyzap.sdk.ads.HeyzapVideoActivity
com.heyzap.sdk.ads.MediationTestActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
Services
net.robotmedia.billing.BillingService
com.vungle.publisher.VungleService
com.google.android.gms.analytics.CampaignTrackingService
Receivers
net.robotmedia.billing.BillingReceiver
com.amazon.inapp.purchasing.ResponseReceiver
com.heyzap.sdk.ads.PackageAddedReceiver
com.google.android.gms.analytics.CampaignTrackingReceiver
Activity-related intent filters
com.djinnworks.framework.App
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.heyzap.sdk.ads.PackageAddedReceiver
actions: android.intent.action.PACKAGE_ADDED
net.robotmedia.billing.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
com.amazon.inapp.purchasing.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
994
Uncompressed size
46959628
Highest datetime
2015-08-03 12:18:24
Lowest datetime
2015-08-03 12:16:34
Contained files by extension
png
621
ogg
71
jpg
68
xml
32
fnt
22
so
10
ttf
2
dex
1
pvr
1
csd
1
RSA
1
SF
1
MF
1
vsh
1
Contained files by type
PNG
621
unknown
156
OGG
71
JPG
68
XML
67
ELF
10
DEX
1
File identification
MD5 ba2f973105593040ff0863b1fb28cdc1
SHA1 75c55ae241ec3c099ba750e6e45b3ac0f6746bb5
SHA256 b88c15cea34cb46bcada445efeeba98d48338e13cda60da3f767c35b0d9b5b73
ssdeep
786432:PJxYf9ROia2sWJuq18TdQpJTEQhM1w25iyxAY40BOPns0U:Bqfiz2eqSTaEQnyxf4eOPs0U

File size 34.6 MB ( 36331717 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2015-08-10 21:31:02 UTC ( 3 years, 7 months ago )
Last submission 2017-06-28 15:36:57 UTC ( 1 year, 8 months ago )
File names b88c15cea34cb46bcada445efeeba98d48338e13cda60da3f767c35b0d9b5b73
Stickman-Downhill-v2-0.apk
stickman-downhill-motocross.apk
stickman-downhill-motocross-2.0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started services
#Intent;action=com.bda.controller.IControllerService;end
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
com.google.analytics.RADIO_POWERED
Opened files
/data/data/com.djinnworks.StickmanDownhillMotocross/files/gaClientId
/data/data/com.djinnworks.StickmanDownhillMotocross/files/gaInstallData
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
http://plus.google.com/
market://details