× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c0cf5b65dc59ef2fc19a32d77a015cf3ae41d95799b8bdcc0d8193fb2a2a78a4
File name: escape-room-mystery-word.apk
Detection ratio: 0 / 59
Analysis date: 2018-10-26 07:02:24 UTC ( 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20181026
AegisLab 20181026
AhnLab-V3 20181026
Alibaba 20180921
ALYac 20181026
Antiy-AVL 20181025
Arcabit 20181026
Avast 20181026
Avast-Mobile 20181025
AVG 20181026
Avira (no cloud) 20181026
Babable 20180918
Baidu 20181026
BitDefender 20181026
Bkav 20181025
CAT-QuickHeal 20181025
ClamAV 20181026
CMC 20181025
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181026
Cyren 20181026
DrWeb 20181026
eGambit 20181026
Emsisoft 20181026
Endgame 20180730
ESET-NOD32 20181026
F-Prot 20181026
F-Secure 20181026
Fortinet 20181026
GData 20181026
Ikarus 20181025
Sophos ML 20180717
Jiangmin 20181026
K7AntiVirus 20181026
K7GW 20181025
Kaspersky 20181025
Kingsoft 20181026
Malwarebytes 20181026
MAX 20181026
McAfee 20181026
McAfee-GW-Edition 20181026
Microsoft 20181026
eScan 20181026
NANO-Antivirus 20181026
Palo Alto Networks (Known Signatures) 20181026
Panda 20181025
Qihoo-360 20181026
Rising 20181026
SentinelOne (Static ML) 20181011
Sophos AV 20181026
SUPERAntiSpyware 20181022
Symantec 20181026
Symantec Mobile Insight 20181001
TACHYON 20181026
Tencent 20181026
TheHacker 20181025
TotalDefense 20181026
TrendMicro 20181026
TrendMicro-HouseCall 20181026
Trustlook 20181026
VBA32 20181025
ViRobot 20181026
Webroot 20181026
Yandex 20181025
Zillya 20181024
ZoneAlarm by Check Point 20181026
Zoner 20181025
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.escape.room.door.word.prison.puzzle.adventure. The internal version number of the application is 106. The displayed version string of the application is 1.0.6. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.escape.room.door.word.prison.puzzle.adventure.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
com.facebook.FacebookActivity
com.facebook.CustomTabActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.appinvite.PreviewActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabMainActivity
com.facebook.ads.AudienceNetworkActivity
com.android.billingclient.api.ProxyBillingActivity
com.facebook.ads.InterstitialAdActivity
com.fw.basemodules.animal.ButterflyNoPadding
com.fw.basemodules.animal.Swallow
com.fw.basemodules.animal.SwallowLargeCard
com.fw.basemodules.animal.SwallowLargeCardOrange
com.fw.basemodules.animal.SwallowLargeCardGreen
com.fw.basemodules.animal.BeeAC
com.fw.basemodules.animal.BeeAP
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.fw.basemodules.ad.mopub.base.common.MoPubBrowser
com.fw.basemodules.ad.mopub.base.mobileads.MraidVideoPlayerActivity
com.fw.basemodules.animal.BeeTF
com.fw.basemodules.animal.BeeTFVD
com.fw.basemodules.wp.INAV
com.fw.basemodules.wp.UFS
com.fw.basemodules.wp.nfp.MIAA
com.fw.basemodules.wp.nfp.FNAV
com.fw.basemodules.animal.LionIRD
com.fw.basemodules.login.activity.LoginActivity
Services
com.escape.room.door.word.prison.puzzle.adventure.service.SyncService
com.escape.room.door.word.prison.puzzle.adventure.service.SyncServiceJbS
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.fw.basemodules.ptoes.MgBSS
com.fw.basemodules.ptoes.MgBSSJbS
com.fw.basemodules.ptoes.LiSS
com.fw.basemodules.ptoes.LiSSJbS
com.fw.basemodules.ptoes.NaLs
com.fw.basemodules.ptoes.NaLsJbS
com.fw.basemodules.extension.np.bubbleview.view.BubblesService
com.fw.basemodules.ad.tp.MPRS
com.fw.basemodules.ad.tp.MPRSJbS
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.iid.FirebaseInstanceIdService
com.firebase.jobdispatcher.GooglePlayReceiver
Receivers
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.fw.basemodules.ptoer.CuEBR
com.fw.basemodules.ptoer.HRAR
com.fw.basemodules.ptoer.FeIR
com.fw.basemodules.ptoer.HeULR
com.fw.basemodules.ptoer.CoAIR
com.fw.basemodules.wuu.BeAER
com.fw.basemodules.ptoer.ZnNBR
com.fw.basemodules.ptoer.CoUR
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.facebook.internal.FacebookInitProvider
com.fw.basemodules.wda.WdaProvider
com.crashlytics.android.CrashlyticsInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
com.firebase.jobdispatcher.GooglePlayReceiver
actions: com.google.android.gms.gcm.ACTION_TASK_READY
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.escape.room.door.word.prison.puzzle.adventure.UnityPlayerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.google.android.gms.appinvite.PreviewActivity
actions: com.google.android.gms.appinvite.ACTION_PREVIEW
categories: android.intent.category.DEFAULT
com.facebook.CustomTabActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.fw.basemodules.ptoer.HeULR
actions: android.intent.action.USER_PRESENT
com.fw.basemodules.ptoer.ZnNBR
actions: com.fw.wp.action.ntfclk
com.fw.basemodules.ptoer.CoAIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.ptoer.CoUR
actions: android.intent.action.PACKAGE_REMOVED, android.intent.action.PACKAGE_ADDED
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.escape.room.door.word.prison.puzzle.adventure
com.escape.room.door.word.prison.puzzle.adventure.notification.NotificationBroadcastReceiver
actions: notification_cancelled
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.escape.room.door.word.prison.puzzle.adventure.receiver.ReferrerTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.fw.basemodules.ptoer.FeIR
actions: android.intent.action.PACKAGE_ADDED
com.fw.basemodules.wuu.BeAER
actions: com.wuu.ae, android.intent.action.ACTION_POWER_CONNECTED, android.intent.action.ACTION_POWER_DISCONNECTED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1450
Uncompressed size
216428316
Highest datetime
2018-10-25 17:24:34
Lowest datetime
2018-10-25 17:24:28
Contained files by extension
xml
401
png
139
dll
72
ttf
8
so
4
dex
2
MF
1
gz
1
RSA
1
SF
1
Contained files by type
XML
397
unknown
386
PNG
139
Portable Executable
72
ELF
4
DEX
2
File identification
MD5 254df8e6e82a2a9472a22187e3abb215
SHA1 bd8c040634cd2b1366868be3dddf388f484ac54f
SHA256 c0cf5b65dc59ef2fc19a32d77a015cf3ae41d95799b8bdcc0d8193fb2a2a78a4
ssdeep
786432:EBvGZMOdsrAAg9IrlSx3Ymme2GF7NT6MvNqhyHM:EBvGZMML6cxo/WDXlqwHM

File size 29.7 MB ( 31108034 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-10-25 09:25:46 UTC ( 5 months ago )
Last submission 2018-10-26 07:31:40 UTC ( 5 months ago )
File names escape-room-mystery-word.apk
EscapeRoom_Android_10001.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!