× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d0dcdac6246a1db4a1a23c37ed23ad009133c2ffc314d4882506cc7fa9d56210
File name: asmo2SRsEBMMED9w6t
Detection ratio: 0 / 60
Analysis date: 2018-09-04 08:13:28 UTC ( 4 months, 2 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180904
AegisLab 20180904
AhnLab-V3 20180903
Alibaba 20180713
ALYac 20180904
Antiy-AVL 20180904
Arcabit 20180904
Avast 20180904
Avast-Mobile 20180904
AVG 20180904
Avira (no cloud) 20180904
AVware 20180823
Babable 20180902
Baidu 20180904
BitDefender 20180904
Bkav 20180831
CAT-QuickHeal 20180902
ClamAV 20180904
CMC 20180903
Comodo 20180904
CrowdStrike Falcon (ML) 20180723
Cybereason 20180225
Cylance 20180904
Cyren 20180904
DrWeb 20180904
eGambit 20180904
Emsisoft 20180904
Endgame 20180730
ESET-NOD32 20180904
F-Prot 20180904
F-Secure 20180903
Fortinet 20180904
Ikarus 20180903
Sophos ML 20180717
Jiangmin 20180904
K7AntiVirus 20180904
K7GW 20180904
Kaspersky 20180904
Kingsoft 20180904
Malwarebytes 20180904
MAX 20180904
McAfee 20180904
McAfee-GW-Edition 20180904
Microsoft 20180904
eScan 20180904
NANO-Antivirus 20180904
Palo Alto Networks (Known Signatures) 20180904
Panda 20180903
Qihoo-360 20180904
Rising 20180904
SentinelOne (Static ML) 20180830
Sophos AV 20180904
SUPERAntiSpyware 20180903
Symantec 20180904
Symantec Mobile Insight 20180831
TACHYON 20180904
Tencent 20180904
TheHacker 20180904
TotalDefense 20180904
TrendMicro 20180904
TrendMicro-HouseCall 20180904
Trustlook 20180904
VBA32 20180903
VIPRE 20180904
ViRobot 20180904
Webroot 20180904
Yandex 20180903
ZoneAlarm by Check Point 20180904
Zoner 20180903
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.king.blossomblast. The internal version number of the application is 170. The displayed version string of the application is 58.0.1. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
com.king.blossomblast.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
com.king.cross.kingapp.provider.ACCESS (Unknown permission from android reference)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.dynamo.android.DefoldActivity
com.dynamo.android.DispatcherActivity
com.facebook.FacebookActivity
com.defold.iap.IapGooglePlayActivity
com.defold.push.LocalPushDispatchActivity
com.defold.push.PushDispatchActivity
com.defold.iac.IACActivity
Services
com.defold.adtruth.InstallReceiver
Receivers
com.defold.push.LocalNotificationReceiver
com.amazon.device.iap.ResponseReceiver
com.defold.push.GcmBroadcastReceiver
com.defold.adtruth.InstallReceiver
com.king.analytics.AnalyticsReceiver
Activity-related intent filters
com.defold.push.LocalPushDispatchActivity
actions: com.defold.push.FORWARD
categories: com.defold.push
com.defold.push.PushDispatchActivity
actions: com.defold.push.FORWARD
categories: com.defold.push
com.defold.iac.IACActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.dynamo.android.DefoldActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.defold.push.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.defold.push.FORWARD
categories: com.defold.push
com.defold.adtruth.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
com.king.analytics.AnalyticsReceiver
actions: com.king.analytics.BOOT_COMPLETED, com.king.analytics.REQUEST_VALUE, com.king.analytics.RECEIVE_VALUE
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
205
Uncompressed size
70767769
Highest datetime
2018-07-24 10:39:30
Lowest datetime
2018-07-24 10:39:28
Contained files by extension
png
170
xml
24
dex
1
MF
1
der
1
RSA
1
so
1
SF
1
Contained files by type
PNG
170
XML
24
unknown
9
DEX
1
ELF
1
File identification
MD5 b598ee12d790778f8f956deb749582d1
SHA1 80fdacbda47416c5650142fce7744e7f32a16831
SHA256 d0dcdac6246a1db4a1a23c37ed23ad009133c2ffc314d4882506cc7fa9d56210
ssdeep
786432:ZjzCOJOoKnvVHWkjrLILSYKUfrYn9l1Aclma8ISFoEijDsh3DjcqtOAwBaqhPGis:ZjNOJHLeS7Ucn1Acl98veEi/C/Ga7sAP

File size 64.5 MB ( 67679904 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (66.4%)
Java Archive (18.3%)
Mozilla Archive Format (gen) (8.8%)
ZIP compressed archive (5.0%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-08-10 04:01:17 UTC ( 5 months, 1 week ago )
Last submission 2018-09-05 06:45:02 UTC ( 4 months, 2 weeks ago )
File names oaas3owwazLxtYDOUOZCjfMLMOx4yuOFhsOTM5v0j863vhxNUCCLzt
msosrdYik0N8lsWOWlsz8gQuUmpaf7O3LZtwXPNUZhBcKVsoavd74pj9m
asmo2SRsEBMMED9w6t
blossom-blast-saga-58.0.1.apk
blossom-blast-saga.apk
985686_29746a_com.king.blossomblast_58.0.1_170.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!