× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ba8bd5ab001ad22e1597a87543cfea659f9489ed54b10d8fbf6eae67ff660131
File name: 178515_90ad3a_garfield_kart_v1.0.5.apk
Detection ratio: 5 / 63
Analysis date: 2017-12-16 22:01:17 UTC ( 1 year, 4 months ago ) View latest
Antivirus Result Update
AegisLab Android.Adware.Gen!c 20171216
Ikarus PUA.AndroidOS 20171216
NANO-Antivirus Trojan.Android.MobiDash.dzgkmn 20171216
Symantec Mobile Insight AdLibrary:AdMob 20171215
WhiteArmor PUP.HighConfidence 20171204
Ad-Aware 20171216
AhnLab-V3 20171216
Alibaba 20171215
ALYac 20171216
Antiy-AVL 20171216
Arcabit 20171215
Avast 20171216
Avast-Mobile 20171216
AVG 20171216
Avira (no cloud) 20171216
AVware 20171216
Baidu 20171216
BitDefender 20171216
Bkav 20171216
CAT-QuickHeal 20171216
ClamAV 20171216
CMC 20171216
Comodo 20171216
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20171216
Cyren 20171216
DrWeb 20171216
eGambit 20171216
Emsisoft 20171216
Endgame 20171130
ESET-NOD32 20171216
F-Prot 20171216
F-Secure 20171216
Fortinet 20171216
GData 20171216
Sophos ML 20170914
Jiangmin 20171216
K7AntiVirus 20171216
K7GW 20171214
Kaspersky 20171216
Kingsoft 20171216
Malwarebytes 20171216
MAX 20171216
McAfee 20171216
McAfee-GW-Edition 20171216
Microsoft 20171216
eScan 20171216
nProtect 20171216
Palo Alto Networks (Known Signatures) 20171216
Panda 20171216
Qihoo-360 20171216
Rising 20171216
SentinelOne (Static ML) 20171207
Sophos AV 20171216
SUPERAntiSpyware 20171216
Symantec 20171216
Tencent 20171216
TheHacker 20171210
TotalDefense 20171216
TrendMicro 20171216
TrendMicro-HouseCall 20171216
Trustlook 20171216
VBA32 20171215
VIPRE 20171216
ViRobot 20171216
Webroot 20171216
Yandex 20171216
Zillya 20171214
ZoneAlarm by Check Point 20171216
Zoner 20171216
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.microids.google.garfieldkart. The internal version number of the application is 10005. The displayed version string of the application is 1.0.5. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.MANAGE_ACCOUNTS (manage the accounts list)
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
android.permission.AUTHENTICATE_ACCOUNTS (act as an account authenticator)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.facebook.LoginActivity
com.littleworlds.ase.ASE_FacebookProxyActivity
com.google.ads.AdActivity
com.prime31.GoogleIABProxyActivity
com.chartboost.sdk.CBDialogActivity
com.chartboost.sdk.CBImpressionActivity
com.muzhiwan.libs.accounts.userinfo.UserLoginActivity
com.muzhiwan.libs.accounts.userinfo.UserRegisterActivity
com.inject_tencent.tauth.TAuthView
com.muzhiwan.embed.MzwEmbededActivity
com.muzhiwan.embed.screenshot.ScreenEditActivity
com.muzhiwan.embed.MzwActivity
Services
com.muzhiwan.embed.LogService
com.muzhiwan.embed.DownLoadService
com.muzhiwan.embed.RemoteBackupService
com.muzhiwan.embed.RestartService
com.muzhiwan.embed.PopWindowService
Receivers
com.google.ads.InstallReceiver
com.amazon.inapp.purchasing.ResponseReceiver
com.muzhiwan.embed.KillBroadcastReceiver
Service-related intent filters
com.muzhiwan.embed.RemoteBackupService
actions: action.com.microids.google.garfieldkart.mzwservice
categories: android.intent.category.DEFAULT
com.muzhiwan.embed.DownLoadService
actions: com.microids.google.garfieldkart_start
categories: android.intent.category.DEFAULT
Activity-related intent filters
com.inject_tencent.tauth.TAuthView
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.muzhiwan.embed.MzwActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.muzhiwan.embed.KillBroadcastReceiver
actions: com.muzhiwan.sdk_kill
categories: android.intent.category.DEFAULT
com.google.ads.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.inapp.purchasing.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
105
Uncompressed size
33886533
Highest datetime
2013-12-07 00:50:18
Lowest datetime
2013-12-07 00:49:24
Contained files by extension
png
47
xml
28
dll
13
so
4
dex
1
MF
1
RSA
1
dat
1
SF
1
Contained files by type
PNG
47
XML
28
Portable Executable
13
unknown
10
ELF
4
ZIP
2
DEX
1
File identification
MD5 3a2419aab63b6053ead5486ef2fe52c8
SHA1 072fb202e335134d0ce1298e185940c82f02ce4e
SHA256 ba8bd5ab001ad22e1597a87543cfea659f9489ed54b10d8fbf6eae67ff660131
ssdeep
196608:wdCLFP8BD+PLr3vvr4QUCKEbHcJAvw0J4G+zqMJuT9MEQKKTsBfisyHrxPue+cML:5/L3XFhVWKK4tis4+3d9Q9XnBuqcOHA

File size 22.5 MB ( 23546043 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2013-12-08 09:17:24 UTC ( 5 years, 4 months ago )
Last submission 2018-11-16 01:04:34 UTC ( 5 months, 1 week ago )
File names 178515_90ad3a_garfield_kart_v1.0.5.apk
Garfield+Kart+v1.0.5.apk
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!