× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: df5576645c3aac4b727ec78663eb47b5d875a00a692cd3ed2d3f0483905979ca
File name: Cheat.Droid.v2.1.apk
Detection ratio: 1 / 55
Analysis date: 2015-07-20 15:33:20 UTC ( 3 years, 10 months ago ) View latest
Antivirus Result Update
Ikarus PUA.AndroidOS.Appflood 20150720
Ad-Aware 20150720
AegisLab 20150720
Yandex 20150720
AhnLab-V3 20150720
Alibaba 20150720
ALYac 20150720
Antiy-AVL 20150720
Arcabit 20150720
Avast 20150720
AVG 20150720
Avira (no cloud) 20150720
AVware 20150720
Baidu-International 20150720
BitDefender 20150720
Bkav 20150720
ByteHero 20150720
CAT-QuickHeal 20150717
ClamAV 20150717
Comodo 20150720
Cyren 20150720
DrWeb 20150720
Emsisoft 20150720
ESET-NOD32 20150720
F-Prot 20150720
F-Secure 20150720
Fortinet 20150720
GData 20150720
Jiangmin 20150719
K7AntiVirus 20150720
K7GW 20150720
Kaspersky 20150720
Kingsoft 20150720
Malwarebytes 20150720
McAfee 20150720
McAfee-GW-Edition 20150719
Microsoft 20150720
eScan 20150720
NANO-Antivirus 20150720
nProtect 20150720
Panda 20150720
Qihoo-360 20150720
Rising 20150720
Sophos AV 20150720
SUPERAntiSpyware 20150720
Symantec 20150720
Tencent 20150720
TheHacker 20150717
TrendMicro 20150720
TrendMicro-HouseCall 20150720
VBA32 20150718
VIPRE 20150720
ViRobot 20150720
Zillya 20150720
Zoner 20150720
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.felixheller.sharedprefseditor. The internal version number of the application is 14. The displayed version string of the application is 2.1. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
android.permission.KILL_BACKGROUND_PROCESSES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
Activities
com.felixheller.sharedprefseditor.activities.StartActivity
com.felixheller.sharedprefseditor.activities.ShowFilesActivity
com.felixheller.sharedprefseditor.activities.EditSharedPrefsActivity
com.felixheller.sharedprefseditor.activities.EditFileActivity
com.felixheller.sharedprefseditor.activities.EditDatabaseActivity
com.felixheller.sharedprefseditor.activities.ShowLogcatActivity
com.google.android.gms.ads.AdActivity
com.startapp.android.publish.list3d.List3DActivity
com.startapp.android.publish.AppWallActivity
com.appflood.AFSplashScreenActivity
com.appflood.mraid.MraidBrowserActivity
com.appflood.AFFullScreenActivity
Receivers
com.appflood.AFReferralReceiver
Activity-related intent filters
com.felixheller.sharedprefseditor.activities.StartActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.appflood.AFReferralReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
517
Uncompressed size
4050311
Highest datetime
2014-12-04 21:41:10
Lowest datetime
2014-12-04 21:37:58
Contained files by extension
png
410
xml
94
zip
7
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
410
XML
94
ZIP
7
unknown
5
DEX
1
File identification
MD5 2d29fd5919c176c834f80795ee8cc756
SHA1 66432145b481678b5d1089fd32c205509c2ab901
SHA256 df5576645c3aac4b727ec78663eb47b5d875a00a692cd3ed2d3f0483905979ca
ssdeep
49152:KBM8NMa0c3SI3O+r+XClJRdWVMoMQDHzYm+r2M3TvaQXDaYhNhXEbPv:KBM8NMVc3SI++qXgJnWVB5TYm+r2M3Tm

File size 2.2 MB ( 2310101 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk checks-gps android

VirusTotal metadata
First submission 2014-12-05 22:07:11 UTC ( 4 years, 5 months ago )
Last submission 2018-11-15 23:08:07 UTC ( 6 months ago )
File names 97343715.apk
145335381.apk
ali.apk
225516700.apk
328479218.apk
197985119.apk
com.felixheller.sharedprefseditor-1.apk
2d29fd5919c176c834f80795ee8cc756.apk
Cheat Droid ★ root only v2.1.apk
Cheat.Droid.v2.1.apk
88408849.apk
541725102.apk
filename
327295880.apk
193573862.apk
122876560.ver
220677023.apk
299106455.apk
242344557.apk
201158125.apk
322333990.apk
232897527.apk
com.felixheller.sharedprefseditor.apk
com.felixheller.sharedprefseditor.apk
package.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started activities
#Intent;component=com.felixheller.sharedprefseditor/com.appflood.AFSplashScreenActivity;i.bottom_color=-1778384896;i.top_color=-1778384896;B.isPortrait=true;B.isFull=false;i.titlebar=0;i.text_color=16777216;end
Opened files
/mnt/sdcard/ppy_cross
Accessed files
/mnt/sdcard/__af_tmp
/data/data/com.felixheller.sharedprefseditor/files/com_appflood_provider_file
/mnt/sdcard/ppy_cross
/mnt/sdcard/ppy_cross/7c8818e0b54505648c31ec132d64a3a7
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Calls APIs that provide access to the system location services. These services allow applications to obtain periodic updates of the device's geographical location, or to fire an application-specified Intent when the device enters the proximity of a given geographical location.
Contacted URLs
http://data.appflood.com/get_token?ot=1&model=6&sm=1&ts=1349802815875&data=LYSbSN%2FR6gkKYEa8IVYeG83BD6la44hc45ZGi3L%2F%2BSAxQKrVyGURvZnUnwYDtNaqAqvmTq67mki%2FckY8CDKxZTVk%2F7KMzbqCfsCfQh%2BbWsi1M7xx1X8p%2F6Mozl8nblB9h5dMW6HV9trzCflXGLmMcAXWKWAWleKZXXJh7MkqBcCCyg5CC%2BeIoXppUrXS%2FOu6t8XDRYyFTY02C%2FxwmnfE8q8x5JoZz3S%2FR7j7BXdygIOFOvC6TBpehg%3D%3D&adtype=257&hh=800&app_key=Fw2jT5F0DUDm6pGN&mac=&aid=9hWw4F4aoC8X4CDGIibCl%2BtqDHCfX6D5&v=10.31&adid=&ww=480&duid=wyUJBk36VRiuB%2FR1qcezeA%3D%3D&bm=QR5NK9yOjVsBKcQLseqNkrTJRhREFSS9BkttDzE2Qs0jI8jKObSkJw%3D%3D&uuid=&signature=5ef192d901c04d95c1564d463848d5ed
Accessed URIs
market://details?id=com.tencent.mobileqq