× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e2011698f189eaf14189839624d66b685b675904f11fbf43992abcdb885d5e86
File name: 487348_53240b_com.mobage.ww.a1903.swtd_android.apk
Detection ratio: 0 / 57
Analysis date: 2016-05-15 04:34:07 UTC ( 3 years ago ) View latest
Antivirus Result Update
Ad-Aware 20160515
AegisLab 20160515
AhnLab-V3 20160514
Alibaba 20160513
ALYac 20160515
Antiy-AVL 20160515
Arcabit 20160515
Avast 20160515
AVG 20160515
Avira (no cloud) 20160514
AVware 20160511
Baidu 20160514
Baidu-International 20160514
BitDefender 20160515
Bkav 20160514
CAT-QuickHeal 20160514
ClamAV 20160515
CMC 20160510
Comodo 20160515
Cyren 20160515
DrWeb 20160515
Emsisoft 20160515
ESET-NOD32 20160515
F-Prot 20160515
F-Secure 20160515
Fortinet 20160515
GData 20160515
Ikarus 20160514
Jiangmin 20160515
K7AntiVirus 20160514
K7GW 20160515
Kaspersky 20160515
Kingsoft 20160515
Malwarebytes 20160515
McAfee 20160515
McAfee-GW-Edition 20160515
Microsoft 20160515
eScan 20160515
NANO-Antivirus 20160515
nProtect 20160513
Panda 20160514
Qihoo-360 20160515
Rising 20160515
Sophos AV 20160515
SUPERAntiSpyware 20160515
Symantec 20160515
Tencent 20160515
TheHacker 20160514
TotalDefense 20160515
TrendMicro 20160515
TrendMicro-HouseCall 20160515
VBA32 20160513
VIPRE 20160515
ViRobot 20160514
Yandex 20160513
Zillya 20160514
Zoner 20160515
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.mobage.ww.a1903.SWTD_Android. The internal version number of the application is 53. The displayed version string of the application is 2.1.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.mobage.ww.a1903.SWTD_Android.permission.RECEIVE_ADM_MESSAGE (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
com.amazon.device.messaging.permission.RECEIVE (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
com.dena.west.lcd.sdk.internal.web.SDKWebViewProxyActivity
com.amazon.identity.auth.device.authorization.AuthorizationActivity
Services
com.CFM.ELAN.ELANAlarmCreator
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler
com.dena.west.lcd.sdk.internal.notification.GcmIntentService
Receivers
com.adjust.sdk.ReferrerReceiver
com.CFM.ELAN.TimedAlarm
com.adjust.sdk.AdjustReferrerReceiver
com.dena.west.lcd.sdk.internal.notification.GcmBroadcastReceiver
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler$Receiver
com.amazon.device.iap.ResponseReceiver
com.dena.west.lcd.sdk.internal.receiver.ReferrerReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.amazon.identity.auth.device.authorization.AuthorizationActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.dena.west.lcd.sdk.internal.notification.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.mobage.ww.a1903.SWTD_Android
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler$Receiver
actions: com.amazon.device.messaging.intent.REGISTRATION, com.amazon.device.messaging.intent.RECEIVE
categories: com.mobage.ww.a1903.SWTD_Android
com.dena.west.lcd.sdk.internal.receiver.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.adjust.sdk.AdjustReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.adjust.sdk.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
288
Uncompressed size
54772212
Highest datetime
2015-09-25 14:37:18
Lowest datetime
2015-08-18 11:09:30
Contained files by extension
png
212
xml
39
dll
12
so
6
dex
1
MF
1
RSA
1
wav
1
txt
1
SF
1
Contained files by type
PNG
212
XML
39
unknown
18
Portable Executable
12
ELF
6
DEX
1
File identification
MD5 9c14a7cd0a61c3e568fe6a7baf67bb85
SHA1 3c6b1d5eb5fd21e5bb35a8a94f42d95dcbdfdd1c
SHA256 e2011698f189eaf14189839624d66b685b675904f11fbf43992abcdb885d5e86
ssdeep
393216:BrYuvI0ExDjO//7C1P1vbx/5FVODIihmhlU0IsTdyH039pi:hYi63Orm1vbx/5F+IihmhlU0I0dcoi

File size 18.8 MB ( 19743457 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-10-08 19:52:09 UTC ( 3 years, 7 months ago )
Last submission 2019-01-28 19:41:57 UTC ( 3 months, 3 weeks ago )
File names star-wars-galactic-defense-2.1.0.apk
d0d791024e22357a10623da94dc9d76934bf1bf48d1f3a6dad61d007cf215274a2a916676ccfb0cd892017b1c5f2575e7a78f4b29a3b05d2d89b78d92595b712
487348_53240b_com.mobage.ww.a1903.swtd_android.apk
filename
star-wars-a-galactic-defense.apk
9C14A7CD0A61C3E568FE6A7BAF67BB85
com.mobage.ww.a1903.SWTD_Android.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.mobage.ww.a1903.SWTD_Android-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.mobage.ww.a1903.SWTD_Android