× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c5a5cbfec1c6e24108a13b8eb8e52da5143aff88f51ef0aeaa750d045e5b99d5
File name: pkg.apk
Detection ratio: 0 / 52
Analysis date: 2016-07-07 06:47:15 UTC ( 2 years, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160707
AegisLab 20160707
AhnLab-V3 20160706
Alibaba 20160707
ALYac 20160707
Antiy-AVL 20160707
Arcabit 20160707
Avast 20160707
AVG 20160707
AVware 20160707
Baidu 20160706
BitDefender 20160707
Bkav 20160706
CAT-QuickHeal 20160707
ClamAV 20160707
CMC 20160704
Comodo 20160707
Cyren 20160707
DrWeb 20160707
Emsisoft 20160707
ESET-NOD32 20160707
F-Prot 20160707
F-Secure 20160707
Fortinet 20160707
GData 20160707
Ikarus 20160707
Jiangmin 20160707
K7AntiVirus 20160706
K7GW 20160707
Kaspersky 20160707
Kingsoft 20160707
Malwarebytes 20160707
McAfee 20160707
McAfee-GW-Edition 20160707
Microsoft 20160707
eScan 20160707
NANO-Antivirus 20160707
nProtect 20160706
Panda 20160706
Qihoo-360 20160707
Sophos AV 20160707
SUPERAntiSpyware 20160707
Symantec 20160707
Tencent 20160707
TheHacker 20160707
TrendMicro 20160708
TrendMicro-HouseCall 20160707
VBA32 20160706
VIPRE 20160707
ViRobot 20160707
Zillya 20160707
Zoner 20160707
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.animoca.google.doraemonpuzzle. The internal version number of the application is 27. The displayed version string of the application is 1.1.1. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.animoca.google.doraemonpuzzle.permission.C2D_MESSAGE (C2DM permission.)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.dreamcortex.DCPortableGameClient.DCPortableGameClient
com.dreamcortex.DCPortableGameClient.utility.WebViewActivity
muneris.android.core.ui.MunerisActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.inmobi.androidsdk.IMBrowserActivity
com.google.android.gms.ads.AdActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.facebook.LoginActivity
com.facebook.ads.InterstitialAdActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.sponsorpay.publisher.mbe.SPBrandEngageActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
org.scribe.ACTIVITY_ENTRY_NAME
Services
com.inmobi.commons.internal.ActivityRecognitionManager
com.google.analytics.tracking.android.CampaignTrackingService
org.OpenUDID.OpenUDID_service
muneris.android.cppwrapper.MunerisPushNotificationServices
Receivers
com.dreamcortex.DCPortableGameClient.utility.NotificationBroadcastReceiver
muneris.android.installationtracking.google.Receiver
muneris.android.cppwrapper.MunerisPushNotificationBroadcastReceiver
Providers
com.animoca.google.doraemonpuzzle.SharePhotoProvider
Service-related intent filters
org.OpenUDID.OpenUDID_service
actions: org.OpenUDID.GETUDID
Activity-related intent filters
com.dreamcortex.DCPortableGameClient.DCPortableGameClient
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
muneris.android.installationtracking.google.Receiver
actions: com.android.vending.INSTALL_REFERRER
muneris.android.cppwrapper.MunerisPushNotificationBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.animoca.google.doraemonpuzzle
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3015
Uncompressed size
15890516
Highest datetime
2016-06-20 18:43:04
Lowest datetime
2016-06-20 18:41:56
Contained files by extension
ccb
57
m4a
5
ogg
5
ttf
4
jpg
2
xml
1
crt
1
txt
1
Contained files by type
unknown
991
OGG
5
XML
2
JPG
2
Execution parents
File identification
MD5 29e63eec6405ac7e3675ae8bf88abc34
SHA1 e742ac1c2e09d904d8e1a9fc733d823ab7a25781
SHA256 c5a5cbfec1c6e24108a13b8eb8e52da5143aff88f51ef0aeaa750d045e5b99d5
ssdeep
786432:nsIadYV1RopbKCIu4/qh8RSv++grFNno+/egWTu56YCuARXAXns7enS4U:nsI4YV16BKC14/doePl/LWTu568AOXsx

File size 40.2 MB ( 42136240 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android

VirusTotal metadata
First submission 2016-07-07 06:47:15 UTC ( 2 years, 10 months ago )
Last submission 2016-08-03 00:13:20 UTC ( 2 years, 9 months ago )
File names pkg.apk
doraemon-gadget-rush.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!