× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d1874bc172a0c90999b453a58f3658a6e14cd486290035225f8984efee49022a
File name: 331384_305b54_shadow-fight-2-v1-9-7.apk
Detection ratio: 0 / 62
Analysis date: 2018-01-03 18:24:55 UTC ( 1 year, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20171225
AegisLab 20180103
AhnLab-V3 20180103
Alibaba 20180103
ALYac 20180103
Antiy-AVL 20180103
Arcabit 20180103
Avast 20180103
Avast-Mobile 20180103
AVG 20180103
Avira (no cloud) 20180103
AVware 20180103
Baidu 20180103
BitDefender 20180103
Bkav 20180103
CAT-QuickHeal 20180103
ClamAV 20180103
CMC 20180103
Comodo 20180103
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180103
Cyren 20180103
DrWeb 20180103
eGambit 20180103
Emsisoft 20180103
Endgame 20171130
ESET-NOD32 20180103
F-Prot 20180103
F-Secure 20180103
Fortinet 20180103
GData 20180103
Ikarus 20180103
Sophos ML 20170914
Jiangmin 20180103
K7AntiVirus 20180103
K7GW 20180103
Kaspersky 20180103
Kingsoft 20180103
Malwarebytes 20180103
MAX 20180103
McAfee 20180102
McAfee-GW-Edition 20180103
Microsoft 20180103
eScan 20180103
NANO-Antivirus 20180103
nProtect 20180103
Palo Alto Networks (Known Signatures) 20180103
Panda 20180103
Qihoo-360 20180103
Rising 20180103
SentinelOne (Static ML) 20171224
Sophos AV 20180103
SUPERAntiSpyware 20180103
Symantec 20180103
Tencent 20180103
TheHacker 20180103
TotalDefense 20180103
TrendMicro 20180103
TrendMicro-HouseCall 20180103
Trustlook 20180103
VBA32 20180103
VIPRE 20180103
ViRobot 20180103
Webroot 20180103
WhiteArmor 20171226
Yandex 20171229
Zillya 20180103
ZoneAlarm by Check Point 20180103
Zoner 20180103
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nekki.shadowfight. The internal version number of the application is 1000070. The displayed version string of the application is 1.9.7. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 14.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.google.android.c2dm.permission.REGISTRATION (Unknown permission from android reference)
com.nekki.shadowfight.permission.C2D_MESSAGE (C2DM permission.)
com.android.alarm.permission.SET_ALARM (set alarm in alarm clock)
android.permission.SET_ORIENTATION (change screen orientation)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.MODIFY_AUDIO_SETTINGS (change your audio settings)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nekki.shadowfight.Main
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.chartboost.sdk.CBImpressionActivity
com.flurry.android.CatalogActivity
com.ideaworks3d.marmalade.s3eAndroidGooglePlayBilling.PurchaseProxy
com.burstly.lib.component.networkcomponent.burstly.BurstlyFullscreenActivity
com.google.ads.AdActivity
com.greystripe.sdk.GSFullscreenActivity
com.inmobi.androidsdk.IMBrowserActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.burstly.lib.component.networkcomponent.jumptap.JumptapActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.vungle.sdk.VungleAdvert
s3esponsorpay.s3eSPBrandEngageActivity
s3esponsorpay.OfferWallActivity
com.sponsorpay.publisher.ofw.SPOfferWallActivity
com.vungle.publisher.FullScreenAdActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
net.metaps.sdk.WallActivity
net.metaps.sdk.StatusActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyDailyRewardAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TJAdUnitView
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
Services
com.hullabu.ac3.HullabuDownloaderService
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyDownloaderService
com.vungle.sdk.VungleIntentService
com.vungle.publisher.VungleService
com.hullabu.ac3.HullabuDownloaderService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.nekki.androidnotifications.TimeAlarm
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
com.ideaworks3d.marmalade.s3eApkExpansionFile.MyAlarmReceiver
com.sponsorpay.advertiser.InstallReferrerReceiver
com.hullabu.ac3.HullabuAlarmReceiver
com.hullabu.ac3.TimeAlarm
com.marmalade.studio.android.gcm.s3eGCMClientLocalReceiver
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
Providers
com.ideaworks3d.marmalade.VFSProvider
Activity-related intent filters
com.nekki.shadowfight.Main
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, tv.ouya.intent.category.GAME
com.flurry.android.CatalogActivity
actions: s3e.offer.intent
categories: android.intent.category.DEFAULT
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.sponsorpay.advertiser.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.marmalade.studio.android.gcm.s3eGCMClientBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nekki.shadowfight
com.appsflyer.extension.s3eAppsFlyerInstallReceiver.s3eAppsFlyerInstallReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
471
Uncompressed size
56216939
Highest datetime
2015-04-06 11:20:54
Lowest datetime
2015-04-06 11:20:06
Contained files by extension
png
141
xml
132
wav
130
so
29
mp3
7
nib
3
sql
3
txt
3
icf
3
dz
2
dex
1
MF
1
RSA
1
js
1
mp4
1
xsd
1
s3e
1
SF
1
Contained files by type
unknown
159
PNG
141
XML
132
ELF
29
MP3
7
HTML
2
DEX
1
File identification
MD5 9c7b68c6f4b017e8a44397e7769db4af
SHA1 6a152aa7ac1d0b4b2a4d360cbd1bfdabb574a118
SHA256 d1874bc172a0c90999b453a58f3658a6e14cd486290035225f8984efee49022a
ssdeep
786432:Et8p6zFVcze5Blbe4AqSQapnZkgycfMf3eAD6BfT7ZowU9pkGSyHt:Eu8xTberfQckCf43WBfT7ZZU3tr

File size 47.7 MB ( 49965635 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (52.5%)
Nokia S60 Web Runtime Widget Package (21.0%)
Java Archive (14.5%)
Mozilla Archive Format (gen) (7.0%)
ZIP compressed archive (4.0%)
Tags
apk android contains-elf dyn-calls software-collection

VirusTotal metadata
First submission 2015-04-06 13:53:31 UTC ( 4 years, 1 month ago )
Last submission 2018-07-15 13:49:25 UTC ( 10 months, 1 week ago )
File names dCTbYH.wsf
com.nekki.shadowfight.apk
shadow-fight-2-v1-9-7.apk
Shadow Fight 2 v1.9.7 (1).apk
Shadow-Fight-2-v1.9.7-1.apk
shadow-fight-2-1-9-7-multi-android.apk
package.apk
331384_305b54_shadow-fight-2-v1-9-7.apk
Shadow Fight 2 v1.9.7.apk
Shadow Fight 2 1.9.7.apk
shadow-fight-2.apk
Shadow-Fight-2_1.9.7.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/data/data/com.nekki.shadowfight/files/AppEventsLogger.persistedevents
/data/data/com.nekki.shadowfight/files/makeramdirectory.txt
/data/data/com.nekki.shadowfight/files
/mnt/sdcard
/data/data/com.nekki.shadowfight/cache
/mnt/sdcard/Android/data/com.nekki.shadowfight/cache
Dynamically called methods
android.content.Context.getExternalCacheDir
android.content.pm.PackageManager.hasSystemFeature 1 argument.
u'android.hardware.touchscreen.multitouch'
Accessed URIs
content://zzzz768b4dcde01d5dbb117274855b95a3a8.VFSProvider
content://com.facebook.katana.provider.AttributionIdProvider