× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c64fc6a689f41028de26baf2dc25d51032ccf00add35a46884f60dcdda0d6500
File name: a971deeb761131fa1b855c0fe553d86e335ec3279c2b32db1ded4e138e9066b1c...
Detection ratio: 0 / 56
Analysis date: 2016-10-05 10:51:35 UTC ( 2 years, 3 months ago ) View latest
Antivirus Result Update
Ad-Aware 20161005
AegisLab 20161005
AhnLab-V3 20161005
Alibaba 20161003
ALYac 20160930
Antiy-AVL 20161005
Arcabit 20161005
Avast 20161005
AVG 20161005
Avira (no cloud) 20161005
AVware 20161005
Baidu 20161001
BitDefender 20161005
Bkav 20161004
CAT-QuickHeal 20161005
ClamAV 20161005
CMC 20161003
Comodo 20161005
CrowdStrike Falcon (ML) 20160725
Cyren 20161005
DrWeb 20161005
Emsisoft 20161005
ESET-NOD32 20161005
F-Prot 20161005
F-Secure 20161005
Fortinet 20161005
GData 20161005
Ikarus 20161005
Sophos ML 20160928
Jiangmin 20161005
K7AntiVirus 20161005
K7GW 20161005
Kaspersky 20161005
Kingsoft 20161005
Malwarebytes 20161005
McAfee 20161005
McAfee-GW-Edition 20161005
Microsoft 20161005
eScan 20161005
NANO-Antivirus 20161005
nProtect 20161005
Panda 20161004
Qihoo-360 20161005
Rising 20161005
Sophos AV 20161005
SUPERAntiSpyware 20161004
Symantec 20161005
Tencent 20161005
TheHacker 20161005
TotalDefense 20160920
TrendMicro 20161005
TrendMicro-HouseCall 20161005
VBA32 20161005
VIPRE 20161005
ViRobot 20161005
Yandex 20161004
Zillya 20161003
Zoner 20161005
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.ayamob.video. The internal version number of the application is 11. The displayed version string of the application is 1.3.7. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.READ_SYNC_SETTINGS (read sync settings)
com.android.launcher.permission.UNINSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher2.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.PROCESS_OUTGOING_CALLS (intercept outgoing calls)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
android.permission.INTERNET (full Internet access)
android.permission.EXPAND_STATUS_BAR (expand/collapse status bar)
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
com.ayamob.video.permission.JPUSH_MESSAGE (Unknown permission from android reference)
android.permission.RECEIVE_USER_PRESENT (Unknown permission from android reference)
com.android.launcher.permission.INSTALL_SHORTCUT (Unknown permission from android reference)
com.android.launcher3.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permissioms.WRITE_DATABASE (Unknown permission from android reference)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
com.android.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_FIND_LOCATION (Unknown permission from android reference)
android.permissions.READ_DATABASE (Unknown permission from android reference)
android.permission.VIBRATE (control vibrator)
android.permission.SYSTEM_ALERT_WINDOW (display system-level alerts)
com.android.launcher.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.android.launcher3.permission.WRITE_SETTINGS (modify global system settings)
com.android.launcher2.permission.WRITE_SETTINGS (modify global system settings)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.READ_CONTACTS (read contact data)
android.permission.MOUNT_UNMOUNT_FILESYSTEMS (mount and unmount file systems)
Activities
com.ayamob.video.MyActivity.StartActivity
com.ayamob.video.BaseActivity.MainActivity
com.ayamob.video.MyActivity.DownloadListActivity
com.ayamob.video.MyActivity.LocalVideoActivity
com.ayamob.video.MyActivity.LocalMediaActivity
com.ayamob.video.MyActivity.PlayVideoActivity
com.ayamob.video.MyActivity.DownloadActivity
com.ayamob.video.MyActivity.Download_To_Tips_Activity
com.ayamob.video.MyActivity.AboutActivity
com.ayamob.video.MyActivity.SettingActivity
com.ayamob.video.MyActivity.LocalMusicActivity
com.ayamob.video.MyActivity.VideoViewActivity
com.ayamob.video.jpush.JpushMainActivity
com.ayamob.video.MyActivity.ChapingActivity
com.facebook.ads.InterstitialAdActivity
com.dianxinos.lockscreen.LockScreenContainer
cn.jpush.android.ui.PopWinActivity
cn.jpush.android.ui.PushActivity
com.ayamob.video.MyActivity.webActivity
com.ayamob.video.MyActivity.YouTubeActivity
com.ayamob.video.MyActivity.GreatAppsChapingActivity
com.ayamob.video.MyActivity.InstagramActivity
com.ayamob.video.MyActivity.InstagramDownloadActivity
com.ayamob.video.MyActivity.VimeoActivity
com.ayamob.video.MyActivity.VimeoDownloadActivity
com.ayamob.video.MyActivity.FaceBookActivity
com.ayamob.video.MyActivity.FacebookDownloadActivity
com.ayamob.video.MyActivity.TwitterActivity
com.ayamob.video.MyActivity.TwitterDownloadActivity
com.ayamob.video.MyActivity.PlayAudioActivity
Services
cn.jpush.android.service.DaemonService
cn.jpush.android.service.DownloadService
cn.jpush.android.service.PushService
com.ayamob.video.Service.InstagramService
Receivers
com.duapps.ad.base.PackageAddReceiver
com.dianxinos.lockscreen.ad.LockPresentReceiver
com.ayamob.video.Receiver.MyStatusReceiver
cn.jpush.android.service.PushReceiver
cn.jpush.android.service.AlarmReceiver
com.ayamob.video.jpush.MyReceiver
Providers
com.duapps.ad.stats.DuAdCacheProvider
Service-related intent filters
cn.jpush.android.service.PushService
actions: cn.jpush.android.intent.REGISTER, cn.jpush.android.intent.REPORT, cn.jpush.android.intent.PushService, cn.jpush.android.intent.PUSH_TIME
cn.jpush.android.service.DaemonService
actions: cn.jpush.android.intent.DaemonService
categories: com.ayamob.video
Activity-related intent filters
com.ayamob.video.MyActivity.PlayVideoActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
com.ayamob.video.MyActivity.PlayAudioActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT
cn.jpush.android.ui.PushActivity
actions: cn.jpush.android.ui.PushActivity
categories: android.intent.category.DEFAULT, com.ayamob.video
com.ayamob.video.MyActivity.StartActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
com.ayamob.video.MyActivity.DownloadActivity
actions: android.intent.action.SEND
categories: android.intent.category.DEFAULT
Receiver-related intent filters
cn.jpush.android.service.PushReceiver
actions: cn.jpush.android.intent.NOTIFICATION_RECEIVED_PROXY, android.intent.action.USER_PRESENT, android.net.conn.CONNECTIVITY_CHANGE, android.intent.action.PACKAGE_ADDED, android.intent.action.PACKAGE_REMOVED
categories: com.ayamob.video
com.dianxinos.lockscreen.ad.LockPresentReceiver
actions: android.intent.action.USER_PRESENT
com.ayamob.video.Receiver.MyStatusReceiver
actions: com.yao.downloaded
com.duapps.ad.base.PackageAddReceiver
actions: android.intent.action.PACKAGE_ADDED
com.ayamob.video.jpush.MyReceiver
actions: cn.jpush.android.intent.REGISTRATION, cn.jpush.android.intent.UNREGISTRATION, cn.jpush.android.intent.MESSAGE_RECEIVED, cn.jpush.android.intent.NOTIFICATION_RECEIVED, cn.jpush.android.intent.NOTIFICATION_OPENED, cn.jpush.android.intent.ACTION_RICHPUSH_CALLBACK
categories: com.ayamob.video
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
596
Uncompressed size
7327746
Highest datetime
2016-07-05 13:38:56
Lowest datetime
2016-07-05 13:31:40
Contained files by extension
png
322
xml
252
so
3
ttf
3
dex
2
txt
2
MF
1
ap_
1
RSA
1
js
1
apk
1
SF
1
Contained files by type
PNG
322
XML
252
unknown
15
ELF
3
DEX
2
ZIP
2
File identification
MD5 1d747d864af1cd9e7ff8e9bbb4e77ebe
SHA1 28ff9d1d6bbb0a2fdcf54d43c7450a814e5a670e
SHA256 c64fc6a689f41028de26baf2dc25d51032ccf00add35a46884f60dcdda0d6500
ssdeep
98304:kJrHfxnlknmy0b3c8v4+8yKKKBO3DH/MX:kBFlphM8v41BB82

File size 3.4 MB ( 3590139 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2016-07-05 08:17:06 UTC ( 2 years, 6 months ago )
Last submission 2018-09-13 13:46:16 UTC ( 4 months, 1 week ago )
File names ayatube-video-downl
ayatube-video-downl
a971deeb761131fa1b855c0fe553d86e335ec3279c2b32db1ded4e138e9066b1ce2c6903c3761e46d3fa7f652b7d01c87742377bdd83362ffb29198f0cab8487
ayatube-video-downl
ayatube-video-downl
ayatube-video-downl
ayatube-video-downl
ayatube-video-downl
ayatube-video-downl
1d747d864af1cd9e7ff8e9bbb4e77ebe
ayatube-video-downl
ayatube-video-downl
ayatube-video-downl
ayatube-video-downloader-1-3-7.apk
ayatube-video-downloader.apk
ayatube-video-downl
ayatube-video-downl
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!