× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c160afba634ea92e4da4485ea8f42372376ff94614664ad0ac381dae9afe5f0f
File name: base.apk
Detection ratio: 0 / 55
Analysis date: 2016-09-22 01:38:49 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160922
AegisLab 20160921
AhnLab-V3 20160921
Alibaba 20160921
ALYac 20160922
Antiy-AVL 20160922
Arcabit 20160921
Avast 20160922
AVG 20160922
Avira (no cloud) 20160922
AVware 20160922
Baidu 20160921
BitDefender 20160922
Bkav 20160921
CAT-QuickHeal 20160921
ClamAV 20160922
CMC 20160921
Comodo 20160922
Cyren 20160922
DrWeb 20160922
Emsisoft 20160922
ESET-NOD32 20160922
F-Prot 20160922
F-Secure 20160921
Fortinet 20160922
GData 20160922
Ikarus 20160921
Jiangmin 20160921
K7AntiVirus 20160921
K7GW 20160922
Kaspersky 20160921
Kingsoft 20160922
Malwarebytes 20160922
McAfee 20160922
McAfee-GW-Edition 20160921
Microsoft 20160921
eScan 20160922
NANO-Antivirus 20160921
nProtect 20160921
Panda 20160921
Qihoo-360 20160922
Rising 20160922
Sophos AV 20160921
SUPERAntiSpyware 20160922
Symantec 20160922
Tencent 20160922
TheHacker 20160920
TrendMicro 20160922
TrendMicro-HouseCall 20160922
VBA32 20160921
VIPRE 20160922
ViRobot 20160922
Yandex 20160921
Zillya 20160921
Zoner 20160922
The file being studied is Android related! APK Android file more specifically. The application's main package name is tw.mobileapp.qrcode.banner. The internal version number of the application is 167. The displayed version string of the application is 1.6.7. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.CAMERA (take pictures and videos)
Activities
tw.mobileapp.qrcode.banner.CaptureActivity
tw.mobileapp.qrcode.banner.CaptureDecodeActivity
tw.mobileapp.qrcode.banner.QRIntroduction
tw.mobileapp.qrcode.banner.HistoryView
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Activity-related intent filters
tw.mobileapp.qrcode.banner.CaptureActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
228
Uncompressed size
5403869
Highest datetime
2016-09-22 08:54:34
Lowest datetime
2016-09-20 13:19:00
Contained files by extension
png
196
xml
26
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
196
XML
25
unknown
6
DEX
1
File identification
MD5 7286558dfed5d9e204c4cda3503660f4
SHA1 1e474466245f99ff1b20995be9a136ed8b4f8e82
SHA256 c160afba634ea92e4da4485ea8f42372376ff94614664ad0ac381dae9afe5f0f
ssdeep
49152:ZyLcCCOBiduZUthpUuebGZ2RjeIbnPy1wxcc:ZyoWwdiQDAC2Rj/7Pyixcc

File size 2.0 MB ( 2093093 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2016-09-22 01:38:49 UTC ( 2 years, 5 months ago )
Last submission 2018-01-15 03:06:42 UTC ( 1 year, 1 month ago )
File names 1863db8dd815dd36e9177748db3f8550999a014635a9627e8da266a3ec17da49b2b44c5bfb80e2659be6a381a93156b6e86bf2170ac860e7d072c03f7eb27ad9
base.apk
qr-code-reader.apk
qr-code-reader.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:tw.mobileapp.qrcode.banner
android.permission.INTERNET:tw.mobileapp.qrcode.banner
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache
Accessed files
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.tmp
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads