× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d9b166d4d4ce0fc9c659c4d7ecb260c3d2014594de7999780af7b015889aa01c
File name: file
Detection ratio: 0 / 63
Analysis date: 2017-09-25 00:45:03 UTC ( 1 year, 7 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170924
AegisLab 20170924
AhnLab-V3 20170923
Alibaba 20170911
ALYac 20170924
Antiy-AVL 20170924
Arcabit 20170924
Avast 20170924
Avast-Mobile 20170923
AVG 20170924
Avira (no cloud) 20170923
AVware 20170923
Baidu 20170922
BitDefender 20170924
CAT-QuickHeal 20170923
ClamAV 20170924
CMC 20170920
Comodo 20170924
CrowdStrike Falcon (ML) 20170804
Cylance 20170925
Cyren 20170924
DrWeb 20170924
Emsisoft 20170924
Endgame 20170821
ESET-NOD32 20170924
F-Prot 20170924
F-Secure 20170924
Fortinet 20170924
GData 20170924
Ikarus 20170924
Sophos ML 20170914
Jiangmin 20170924
K7AntiVirus 20170924
K7GW 20170924
Kaspersky 20170924
Kingsoft 20170925
Malwarebytes 20170924
MAX 20170924
McAfee 20170924
McAfee-GW-Edition 20170924
Microsoft 20170924
eScan 20170924
NANO-Antivirus 20170924
nProtect 20170924
Palo Alto Networks (Known Signatures) 20170925
Panda 20170924
Qihoo-360 20170925
Rising 20170924
SentinelOne (Static ML) 20170806
Sophos AV 20170923
SUPERAntiSpyware 20170924
Symantec 20170923
Symantec Mobile Insight 20170922
Tencent 20170925
TheHacker 20170921
TotalDefense 20170924
TrendMicro 20170924
TrendMicro-HouseCall 20170924
Trustlook 20170925
VBA32 20170922
VIPRE 20170924
ViRobot 20170924
Webroot 20170925
WhiteArmor 20170829
Yandex 20170908
Zillya 20170922
ZoneAlarm by Check Point 20170924
Zoner 20170924
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.dmg.hardway. The internal version number of the application is 10. The displayed version string of the application is 0.0.60. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 25.
Required permissions
com.google.android.providers.gsf.permission.READ_GSERVICES (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.unity3d.player.VideoPlayer
com.unity3d.player.UnityPlayerActivity
com.androidnative.AndroidNativeProxy
com.androidnative.features.social.common.SocialProxyActivity
com.chartboost.sdk.CBImpressionActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.google.games.bridge.NativeBridgeActivity
com.voxelbusters.nativeplugins.features.gameservices.serviceprovider.google.GooglePlayGameUIActivity
com.voxelbusters.nativeplugins.features.ui.UiActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.twitter.sdk.android.core.identity.OAuthActivity
com.twitter.sdk.android.core.identity.ShareEmailActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.google.android.gms.auth.api.signin.RevocationBoundService
Providers
com.voxelbusters.nativeplugins.extensions.FileProviderExtended
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
537
Uncompressed size
204999804
Highest datetime
2017-03-25 19:35:24
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
97
xml
43
dll
21
so
4
dex
1
MF
1
RSA
1
SF
1
Contained files by type
unknown
371
PNG
97
XML
43
Portable Executable
21
ELF
4
DEX
1
File identification
MD5 f3e6250c709045fee143cc41eb73882f
SHA1 01e172d047ea6864822e7b9a72a87130089ad742
SHA256 d9b166d4d4ce0fc9c659c4d7ecb260c3d2014594de7999780af7b015889aa01c
ssdeep
786432:X8r9Yb7eE1di5D4164upaKNmdOZniWPYRox7:X8rITDi5sUgKJniLRox7

File size 24.4 MB ( 25545942 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-03-26 02:15:21 UTC ( 2 years, 1 month ago )
Last submission 2018-10-12 15:46:04 UTC ( 7 months, 1 week ago )
File names com.dmg.hardway_10.apk
com.dmg.hardway.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!