× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: cc70df11cd429d57d6956b2b45545d0c4192b4c124218f0d95f09fc00ee28204
File name: monster-city.apk
Detection ratio: 0 / 58
Analysis date: 2017-06-28 13:05:14 UTC ( 1 year, 9 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170628
AegisLab 20170628
AhnLab-V3 20170628
Alibaba 20170628
ALYac 20170628
Antiy-AVL 20170628
Arcabit 20170628
Avast 20170628
AVG 20170628
Avira (no cloud) 20170628
AVware 20170628
Baidu 20170628
BitDefender 20170628
CAT-QuickHeal 20170628
ClamAV 20170628
CMC 20170628
Comodo 20170628
CrowdStrike Falcon (ML) 20170420
Cyren 20170628
DrWeb 20170628
Emsisoft 20170628
Endgame 20170615
ESET-NOD32 20170628
F-Prot 20170628
F-Secure 20170628
Fortinet 20170628
GData 20170628
Ikarus 20170628
Sophos ML 20170607
Jiangmin 20170628
K7AntiVirus 20170627
K7GW 20170628
Kaspersky 20170628
Kingsoft 20170628
Malwarebytes 20170628
McAfee 20170628
McAfee-GW-Edition 20170628
Microsoft 20170628
eScan 20170628
NANO-Antivirus 20170628
nProtect 20170628
Palo Alto Networks (Known Signatures) 20170628
Panda 20170628
Qihoo-360 20170628
Rising 20170628
SentinelOne (Static ML) 20170516
Sophos AV 20170628
SUPERAntiSpyware 20170628
Symantec 20170628
Symantec Mobile Insight 20170627
Tencent 20170628
TheHacker 20170628
TotalDefense 20170628
Trustlook 20170628
VBA32 20170628
VIPRE 20170628
ViRobot 20170628
Webroot 20170628
WhiteArmor 20170627
Yandex 20170627
Zillya 20170623
ZoneAlarm by Check Point 20170628
Zoner 20170628
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.tappocket.monstercity. The internal version number of the application is 1491300971. The displayed version string of the application is 7.11. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 17.
Required permissions
com.tappocket.monstercity.permission.RECEIVE_ADM_MESSAGE (Unknown permission from android reference)
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
com.amazon.device.messaging.permission.RECEIVE (Unknown permission from android reference)
Activities
com.apportable.activity.VerdeActivity
com.chartboost.sdk.CBImpressionActivity
com.facebook.LoginActivity
Services
com.apportable.adm.ADMMessageHandler
com.apportable.media.AudioManagerService
com.apportable.notifications.LocalNotificationService
com.apportable.iap.BillingService
com.parse.PushService
Receivers
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
com.apportable.notifications.NotificationsBootReceiver
com.apportable.notifications.NotificationsAlarmReceiver
com.apportable.iap.BillingReceiver
com.parse.ParseBroadcastReceiver
com.parsebridge.ParseReceiverIntent
Activity-related intent filters
com.apportable.activity.VerdeActivity
actions: android.intent.action.VIEW, android.intent.action.MAIN, android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE, android.intent.category.LAUNCHER
Receiver-related intent filters
com.apportable.notifications.NotificationsBootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.HOME
com.parsebridge.ParseReceiverIntent
actions: com.tappocket.monstercity
com.parse.ParseBroadcastReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.USER_PRESENT
com.apportable.adm.ADMMessageHandler$MessageAlertReceiver
actions: com.amazon.device.messaging.intent.REGISTRATION, com.amazon.device.messaging.intent.RECEIVE
categories: com.tappocket.monstercity
com.apportable.iap.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3337
Uncompressed size
21536546
Highest datetime
2017-04-04 16:17:36
Lowest datetime
2014-07-17 18:21:32
Contained files by extension
png
798
mp3
42
xml
33
jpg
6
txt
3
m4a
1
Contained files by type
PNG
798
XML
148
OGG
43
JPG
6
unknown
5
File identification
MD5 bd41451b8cac6dc051b09729f79ce5d6
SHA1 3c288d334973b36641b27a3c0b608a6685d222f5
SHA256 cc70df11cd429d57d6956b2b45545d0c4192b4c124218f0d95f09fc00ee28204
ssdeep
1572864:43cDaUCTgBTZrrTOaBJGJDGy1I1RAZEEGTIJ3Nh4ffetlmV:43yaO1ZrWa6JCy1UEES3N6fWlmV

File size 66.6 MB ( 69821040 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (50.4%)
Java Archive (13.9%)
BlueEyes Animation (12.9%)
Sweet Home 3D design (generic) (10.0%)
Konfabulator widget (7.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-06-28 13:05:14 UTC ( 1 year, 9 months ago )
Last submission 2017-06-28 13:05:14 UTC ( 1 year, 9 months ago )
File names monster-city.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!