× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: bd0091bae5d9da909bbf1ca4906ac6f20d114107c20b403e499220d0e81b2a62
File name: base.apk
Detection ratio: 0 / 61
Analysis date: 2017-08-26 21:48:45 UTC ( 1 year, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20170826
AegisLab 20170826
AhnLab-V3 20170826
Alibaba 20170825
ALYac 20170826
Antiy-AVL 20170826
Arcabit 20170826
Avast 20170826
AVG 20170826
Avira (no cloud) 20170826
AVware 20170826
Baidu 20170825
BitDefender 20170826
Bkav 20170826
CAT-QuickHeal 20170826
ClamAV 20170826
CMC 20170826
Comodo 20170826
CrowdStrike Falcon (ML) 20170804
Cylance 20170826
Cyren 20170826
DrWeb 20170826
Emsisoft 20170826
Endgame 20170821
ESET-NOD32 20170826
F-Prot 20170826
F-Secure 20170826
Fortinet 20170826
GData 20170826
Ikarus 20170826
Sophos ML 20170822
Jiangmin 20170826
K7AntiVirus 20170824
K7GW 20170821
Kaspersky 20170826
Kingsoft 20170826
Malwarebytes 20170826
MAX 20170826
McAfee 20170826
McAfee-GW-Edition 20170826
Microsoft 20170826
eScan 20170826
NANO-Antivirus 20170826
nProtect 20170826
Palo Alto Networks (Known Signatures) 20170826
Panda 20170826
Qihoo-360 20170826
Rising 20170826
SentinelOne (Static ML) 20170806
Sophos AV 20170826
SUPERAntiSpyware 20170826
Symantec 20170826
Symantec Mobile Insight 20170825
Tencent 20170826
TheHacker 20170825
TrendMicro 20170826
TrendMicro-HouseCall 20170826
Trustlook 20170826
VBA32 20170825
VIPRE 20170826
ViRobot 20170826
Webroot 20170826
WhiteArmor 20170817
Yandex 20170825
Zillya 20170825
ZoneAlarm by Check Point 20170826
Zoner 20170826
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.opera.vpn. The internal version number of the application is 27. The displayed version string of the application is 1.4.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.opera.operavpn.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.opera.operavpn.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.opera.operavpn.SplashActivity
com.opera.operavpn.OnBoardingActivity
com.opera.operavpn.MainActivity
com.opera.operavpn.StatsActivity
com.opera.operavpn.AboutActivity
com.opera.operavpn.SettingsActivity
com.mixpanel.android.surveys.SurveyActivity
com.surfeasy.sdk.helpers.DummyActivity
com.google.android.gms.common.api.GoogleApiActivity
Services
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.CampaignTrackingService
com.surfeasy.presenter.notification.NotificationService
de.blinkt.openvpn.OpenVpnService
com.surfeasy.model.messaging.GCMIntentService
de.blinkt.openvpn.VpnReconnectionService
com.evernote.android.job.v21.PlatformJobService
com.evernote.android.job.v14.PlatformAlarmService
com.evernote.android.job.gcm.PlatformGcmService
com.evernote.android.job.JobRescheduleService
Receivers
com.opera.operavpn.receivers.WifiReceiver
com.google.android.gms.analytics.AnalyticsReceiver
com.google.android.gms.analytics.CampaignTrackingReceiver
com.surfeasy.model.messaging.GCMBroadcastReceiver
com.surfeasy.model.AppInstallReceiver
com.surfeasy.sdk.api.NetworkChangeBroadcastReceiver$NetworkChange
de.blinkt.openvpn.OnBootReceiver
com.evernote.android.job.v14.PlatformAlarmReceiver
com.evernote.android.job.JobBootReceiver
Providers
android.support.v4.content.FileProvider
Service-related intent filters
de.blinkt.openvpn.OpenVpnService
actions: android.net.VpnService
com.evernote.android.job.gcm.PlatformGcmService
actions: com.google.android.gms.gcm.ACTION_TASK_READY
Activity-related intent filters
com.opera.operavpn.SplashActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.evernote.android.job.v14.PlatformAlarmReceiver
actions: com.evernote.android.job.v14.RUN_JOB, net.vrallev.android.job.v14.RUN_JOB
com.surfeasy.model.messaging.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.opera.operavpn
com.evernote.android.job.JobBootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON, com.htc.intent.action.QUICKBOOT_POWERON, android.intent.action.MY_PACKAGE_REPLACED
de.blinkt.openvpn.OnBootReceiver
actions: android.intent.action.QUICKBOOT_POWERON, android.intent.action.BOOT_COMPLETED, android.intent.action.MY_PACKAGE_REPLACED
com.surfeasy.sdk.api.NetworkChangeBroadcastReceiver$NetworkChange
actions: android.net.conn.CONNECTIVITY_CHANGE, android.net.conn.TETHER_STATE_CHANGED
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.opera.operavpn.receivers.WifiReceiver
actions: com.surfeasy.wifi_security.UNSECURE_WIFI
com.surfeasy.model.AppInstallReceiver
actions: android.intent.action.INSTALL_PACKAGE, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED
com.google.android.gms.analytics.AnalyticsReceiver
actions: com.google.android.gms.analytics.ANALYTICS_DISPATCH
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1291
Uncompressed size
68544634
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
655
jpg
159
xml
70
so
65
gif
15
otf
4
x86
2
key
2
dex
1
MF
1
crt
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
655
JPG
159
ELF
77
XML
69
unknown
24
GIF
15
DEX
1
File identification
MD5 2603295c300672ddcecdb91fbae8546d
SHA1 8c9b6740a1e46c5fe8777be56330c13ff3b5199f
SHA256 bd0091bae5d9da909bbf1ca4906ac6f20d114107c20b403e499220d0e81b2a62
ssdeep
786432:DYIf8xLKodJ7XzEmQkuYzpdQgMgeUF2E8XrLa/bucvxztZpfVwxUa/3O6Y:d8xGon7Vb7z9Mg+TXfMPxgd3PY

File size 46.8 MB ( 49065454 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (53.5%)
Java Archive (14.7%)
BlueEyes Animation (13.7%)
VYM Mind Map (12.7%)
ZIP compressed archive (4.0%)
Tags
apk android contains-elf via-tor

VirusTotal metadata
First submission 2017-08-26 21:48:45 UTC ( 1 year, 1 month ago )
Last submission 2018-08-16 02:25:11 UTC ( 2 months ago )
File names opera-free-vpn-unlimited-vpn-1-4-0.apk
Opera VPN 1.4.0П.apk
com.opera.vpn_1.4.0-27_minAPI15(arm64-v8a,armeabi,armeabi-v7a,mips,mips64,x86,x86_64)(nodpi)_apkmirror.com.apk
opera-vpn-1-4-0.apk
base.apk
com.opera.vpn_1.4.0.apk
887747_177dd9_opera_free_vpn_unlimited_vpn_v1.4.0.apk
opera-free-vpn-unlimited-vpn.apk
Operavpn_1.4.0.apk
Opera VPN-1.4.0.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!