× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cbbb5a934b9b6a819016c35f41f9b83ee394184161b10da73be1e1af2f285b00
File name: maplestory-m.apk
Detection ratio: 0 / 62
Analysis date: 2018-08-12 11:20:20 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20180812
AegisLab 20180812
AhnLab-V3 20180812
Alibaba 20180713
ALYac 20180812
Antiy-AVL 20180812
Arcabit 20180812
Avast 20180812
Avast-Mobile 20180812
AVG 20180812
Avira (no cloud) 20180812
AVware 20180812
Babable 20180725
Baidu 20180810
BitDefender 20180812
Bkav 20180810
CAT-QuickHeal 20180811
ClamAV 20180812
CMC 20180812
Comodo 20180812
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20180812
Cyren 20180812
DrWeb 20180812
eGambit 20180812
Emsisoft 20180812
Endgame 20180730
ESET-NOD32 20180812
F-Prot 20180812
F-Secure 20180812
Fortinet 20180812
GData 20180812
Ikarus 20180812
Sophos ML 20180717
Jiangmin 20180812
K7AntiVirus 20180812
K7GW 20180812
Kaspersky 20180812
Kingsoft 20180812
Malwarebytes 20180812
MAX 20180812
McAfee 20180812
McAfee-GW-Edition 20180812
Microsoft 20180812
eScan 20180812
NANO-Antivirus 20180812
Palo Alto Networks (Known Signatures) 20180812
Panda 20180812
Qihoo-360 20180812
Rising 20180812
SentinelOne (Static ML) 20180701
Sophos AV 20180812
SUPERAntiSpyware 20180812
Symantec 20180811
Symantec Mobile Insight 20180809
TACHYON 20180812
Tencent 20180812
TheHacker 20180812
TotalDefense 20180812
TrendMicro 20180812
TrendMicro-HouseCall 20180812
Trustlook 20180812
VBA32 20180810
VIPRE 20180812
ViRobot 20180811
Webroot 20180812
Yandex 20180810
Zillya 20180812
ZoneAlarm by Check Point 20180812
Zoner 20180811
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexon.maplem.global. The internal version number of the application is 273. The displayed version string of the application is 1.2703.273. The minimum Android API level for the application to run (MinSDKVersion) is 19. The target Android API level for the application to run (TargetSDKVersion) is 26.
Required permissions
com.nexon.maplem.global.permission.C2D_MESSAGE (C2DM permission.)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.nexon.maplem.module.MapleUnityActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.facebook.FacebookActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.tapjoy.TJContentActivity
com.androidnative.billing.core.AN_BillingProxyActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.CustomTabActivity
com.facebook.CustomTabMainActivity
com.nhn.android.naverlogin.ui.OAuthLoginActivity
com.nhn.android.naverlogin.ui.OAuthLoginInAppBrowserActivity
com.naver.glink.android.sdk.login.neoid.NeoIdInAppBrowserActivity
com.naver.glink.android.sdk.ui.parent.plugfragment.activityresult.RequestActivity
com.naver.glink.android.sdk.login.neoid.PlugSchemeActivity
Services
kr.co.nexon.npaccount.gcm.NXPFcmMessagingService
kr.co.nexon.npaccount.gcm.NXPFcmInstanceIDService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.iid.FirebaseInstanceIdService
com.naver.glink.android.sdk.ui.streaming.publish.PublishService
Receivers
com.tapjoy.GCMReceiver
com.tapjoy.TapjoyReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.tapjoy.InstallReferrerReceiver
kr.co.nexon.mdev.android.push.local.NPNotification
kr.co.nexon.mdev.android.push.local.NPNotificationRestore
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
kr.co.nexon.npaccount.gcm.NXPFcmMessagingService
actions: com.google.firebase.MESSAGING_EVENT
kr.co.nexon.npaccount.gcm.NXPFcmInstanceIDService
actions: com.google.firebase.INSTANCE_ID_EVENT
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.nexon.maplem.module.MapleUnityActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.naver.glink.android.sdk.login.neoid.PlugSchemeActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexon.maplem.global
com.tapjoy.GCMReceiver
actions: com.google.android.c2dm.intent.REGISTRATION, com.google.android.c2dm.intent.RECEIVE, com.google.android.gcm.intent.RETRY
categories: com.nexon.maplem.global
kr.co.nexon.mdev.android.push.local.NPNotificationRestore
actions: android.intent.action.BOOT_COMPLETED
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
2408
Uncompressed size
40495269
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
xml
2
dat
2
md
1
MF
1
map
1
fsh
1
jar
1
RSA
1
ini
1
vsh
1
SF
1
Contained files by type
unknown
993
XML
6
ZIP
1
File identification
MD5 105b4a48de1785d066e89db45fcc987b
SHA1 d597dd6d1d288d2494f2b80dd6432b6ebbb862ff
SHA256 cbbb5a934b9b6a819016c35f41f9b83ee394184161b10da73be1e1af2f285b00
ssdeep
1572864:d+RIL35YXOVW3ZHm7v57ZEvce5wTlCA9MnSqxJW+V0sj7Ig6f9iv+IvfB:d+k35uOVbvlSwTIA9UPxJL5v8f9aPvJ

File size 81.5 MB ( 85489855 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk android via-tor

VirusTotal metadata
First submission 2018-07-25 04:43:23 UTC ( 6 months ago )
Last submission 2018-08-15 10:07:58 UTC ( 5 months, 1 week ago )
File names maplestory-m-1-2703-273.apk
maplestory-m-1.2703.273.apk
MapleStory M.apk
maplestory-m.apk
MapleStory M_v1.2703.273_apkpure.com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!