× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e3b74bc4f0a0c2b0c44cb5608a5212b4dc1b873df42ef2240aff3c3e6e1302ae
File name: com.bandai.powerrangers.dinocharge-23.apk
Detection ratio: 2 / 63
Analysis date: 2018-02-03 01:01:07 UTC ( 1 year, 3 months ago ) View latest
Antivirus Result Update
AegisLab Ml.Relationship.Highconfidence.[Troj!c 20180202
Symantec Trojan.Gen.2 20180202
Ad-Aware 20180202
AhnLab-V3 20180202
Alibaba 20180202
ALYac 20180202
Antiy-AVL 20180202
Arcabit 20180202
Avast 20180203
Avast-Mobile 20180202
AVG 20180203
Avira (no cloud) 20180203
AVware 20180203
Baidu 20180202
BitDefender 20180202
Bkav 20180202
CAT-QuickHeal 20180202
ClamAV 20180202
CMC 20180202
Comodo 20180202
CrowdStrike Falcon (ML) 20170201
Cybereason 20171103
Cylance 20180203
Cyren 20180202
DrWeb 20180203
eGambit 20180203
Emsisoft 20180203
Endgame 20171130
ESET-NOD32 20180203
F-Prot 20180202
F-Secure 20180202
Fortinet 20180202
GData 20180203
Ikarus 20180202
Sophos ML 20180121
Jiangmin 20180202
K7AntiVirus 20180202
K7GW 20180202
Kaspersky 20180202
Kingsoft 20180203
Malwarebytes 20180202
MAX 20180203
McAfee 20180203
McAfee-GW-Edition 20180202
Microsoft 20180203
eScan 20180202
NANO-Antivirus 20180202
nProtect 20180202
Palo Alto Networks (Known Signatures) 20180203
Panda 20180202
Qihoo-360 20180203
Rising 20180203
SentinelOne (Static ML) 20180115
Sophos AV 20180202
SUPERAntiSpyware 20180203
Symantec Mobile Insight 20180202
Tencent 20180203
TheHacker 20180202
TotalDefense 20180202
TrendMicro 20180203
TrendMicro-HouseCall 20180203
Trustlook 20180203
VBA32 20180202
VIPRE 20180203
ViRobot 20180203
Webroot 20180203
Yandex 20180130
Zillya 20180202
ZoneAlarm by Check Point 20180202
Zoner 20180202
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.bandai.powerrangers.dinocharge. The internal version number of the application is 23. The displayed version string of the application is 1.5.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.CAMERA (take pictures and videos)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
com.xzimg.rigidfacetracking.RigidFaceTrackingPlugin
net.sanukin.OverrideUnityActivity
com.prime31.EtceteraProxyActivity
com.prime31.WebViewActivity
com.prime31.P31VideoPlayerActivity
com.c4mprod.ezcodescanner.RootActivity
com.c4mprod.ezcodescanner.camera.CameraActivity
com.secondfury.nativetoolkit.MainActivity
Receivers
com.prime31.AlarmManagerReceiver
Activity-related intent filters
com.xzimg.rigidfacetracking.RigidFaceTrackingPlugin
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
44
Uncompressed size
47960199
Highest datetime
2017-01-03 12:21:12
Lowest datetime
2015-10-12 15:17:56
Contained files by extension
dll
13
so
11
png
8
xml
2
dex
1
MF
1
RSA
1
SF
1
Contained files by type
Portable Executable
13
ELF
11
unknown
9
PNG
8
XML
2
DEX
1
File identification
MD5 dfe558c79b8d38d68793cd0b98f5b4df
SHA1 7af17a9680806f23711819a7eecb95dfad79ee72
SHA256 e3b74bc4f0a0c2b0c44cb5608a5212b4dc1b873df42ef2240aff3c3e6e1302ae
ssdeep
393216:vuxK7HIHn1hfyexq6gsj+BsBAxkzm1okqMdD5Kt8Uz8lnKiFCS5JKiBjnzwa:viuIHrZxusj+S6kzMo+dD5uvz699B7ka

File size 17.7 MB ( 18561513 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-01-05 22:56:41 UTC ( 2 years, 4 months ago )
Last submission 2018-04-24 23:56:00 UTC ( 1 year ago )
File names base.apk
com.bandai.powerrangers.dinocharge-23.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!