× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d3debc53ec954b75d421f7ff3db6b95cf1a1f26f75afc715e3745d913b96b362
File name: shuffle-cat-cards.apk
Detection ratio: 0 / 60
Analysis date: 2017-04-01 09:24:48 UTC ( 1 year, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170331
AegisLab 20170331
AhnLab-V3 20170331
Alibaba 20170331
ALYac 20170331
Antiy-AVL 20170331
Arcabit 20170330
Avast 20170330
AVG 20170330
Avira (no cloud) 20170330
AVware 20170330
Baidu 20170331
BitDefender 20170331
CAT-QuickHeal 20170401
ClamAV 20170331
CMC 20170331
Comodo 20170331
CrowdStrike Falcon (ML) 20170130
Cyren 20170331
DrWeb 20170331
Emsisoft 20170331
Endgame 20170401
ESET-NOD32 20170401
F-Prot 20170401
F-Secure 20170401
Fortinet 20170401
GData 20170401
Ikarus 20170401
Sophos ML 20170203
Jiangmin 20170401
K7AntiVirus 20170401
K7GW 20170401
Kaspersky 20170401
Kingsoft 20170401
Malwarebytes 20170401
McAfee 20170401
McAfee-GW-Edition 20170401
Microsoft 20170401
eScan 20170331
NANO-Antivirus 20170401
nProtect 20170401
Palo Alto Networks (Known Signatures) 20170401
Panda 20170401
Qihoo-360 20170401
Rising 20170401
SentinelOne (Static ML) 20170330
Sophos AV 20170331
SUPERAntiSpyware 20170401
Symantec 20170331
Symantec Mobile Insight 20170331
Tencent 20170401
TheHacker 20170330
TotalDefense 20170401
TrendMicro 20170331
TrendMicro-HouseCall 20170331
Trustlook 20170401
VBA32 20170331
VIPRE 20170331
ViRobot 20170331
Webroot 20170401
WhiteArmor 20170327
Yandex 20170327
Zillya 20170331
ZoneAlarm by Check Point 20170331
Zoner 20170401
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.king.shufflecatcards. The internal version number of the application is 100141. The displayed version string of the application is 1.0.14. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
android.permission.INTERNET_ACROSS_USERS_FULL (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.king.cross.kingapp.provider.debug.ACCESS (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.king.shufflecatcards.ShuffleCatCardsActivity
com.king.core.VideoPlayerActivity
com.facebook.FacebookActivity
Services
com.king.core.GCMIntentService
com.king.core.AlarmService
com.king.core.AlarmService.LargeIcon
com.king.store.billing.BillingService
Receivers
com.king.core.ReferrerReceiver
com.king.core.GCMBroadcastReceiver
com.king.store.billing.BillingReceiver
Providers
com.king.core.VideoPlayerAssetsProvider
Activity-related intent filters
com.king.shufflecatcards.ShuffleCatCardsActivity
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.king.core.VideoPlayerActivity
actions: android.intent.action.VIEW
categories: android.intent.category.EMBED
Receiver-related intent filters
com.king.core.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories:
com.king.core.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.king.store.billing.BillingReceiver
actions: com.android.vending.billing.IN_APP_NOTIFY, com.android.vending.billing.RESPONSE_CODE, com.android.vending.billing.PURCHASE_STATE_CHANGED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
3612
Uncompressed size
7676963
Highest datetime
2017-03-14 15:45:50
Lowest datetime
2017-03-14 15:41:34
Contained files by extension
csv
633
xml
138
png
7
fnt
6
jpg
5
ttf
2
MF
1
crt
1
RSA
1
otf
1
SF
1
Contained files by type
unknown
971
XML
15
PNG
7
JPG
5
HTML
2
File identification
MD5 123ed8f618a06464ed86600893a240f5
SHA1 8ff541f3a7e9ff0a901b8b076967f505ce48f1a6
SHA256 d3debc53ec954b75d421f7ff3db6b95cf1a1f26f75afc715e3745d913b96b362
ssdeep
1572864:bhJZKmEbBr2WmmSHj7hTMgfOPm9i5vA+c7rcA0J:lJZCzmLH/hTMgfui90J

File size 57.2 MB ( 60010548 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (56.7%)
OpenOffice Extension (23.2%)
Java Archive (15.6%)
ZIP compressed archive (4.3%)
Tags
apk android

VirusTotal metadata
First submission 2017-03-15 20:19:26 UTC ( 2 years ago )
Last submission 2017-06-28 13:43:24 UTC ( 1 year, 8 months ago )
File names base.apk
shuffle-cat-cards.apk
shuffle-cat-cards.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!