× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e3e5e3cbd813f70cb90c12cda62c5e6f73bc22934be298bf5f1ba2f4606a69ed
File name: 1424665803_com.statespotdiscovery.invite.apk
Detection ratio: 2 / 56
Analysis date: 2016-06-24 15:36:18 UTC ( 1 year, 12 months ago )
Antivirus Result Update
Bkav Android.Adware.Dowgin.D077 20160623
NANO-Antivirus Trojan.Android.SmsSend.darrny 20160624
Ad-Aware 20160624
AegisLab 20160624
AhnLab-V3 20160624
Alibaba 20160624
ALYac 20160624
Antiy-AVL 20160624
Arcabit 20160624
Avast 20160624
AVG 20160624
Avira (no cloud) 20160624
AVware 20160624
Baidu 20160624
Baidu-International 20160614
BitDefender 20160624
CAT-QuickHeal 20160623
ClamAV 20160624
CMC 20160620
Comodo 20160624
Cyren 20160624
DrWeb 20160624
Emsisoft 20160624
ESET-NOD32 20160624
F-Prot 20160624
F-Secure 20160624
Fortinet 20160624
GData 20160624
Ikarus 20160624
Jiangmin 20160624
K7AntiVirus 20160624
K7GW 20160624
Kaspersky 20160624
Kingsoft 20160624
Malwarebytes 20160624
McAfee 20160624
McAfee-GW-Edition 20160624
Microsoft 20160624
eScan 20160624
nProtect 20160624
Panda 20160624
Qihoo-360 20160624
Sophos AV 20160624
SUPERAntiSpyware 20160624
Symantec 20160624
Tencent 20160624
TheHacker 20160624
TotalDefense 20160624
TrendMicro 20160624
TrendMicro-HouseCall 20160624
VBA32 20160624
VIPRE 20160624
ViRobot 20160624
Yandex 20160624
Zillya 20160624
Zoner 20160624
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.statespotdiscovery.invite. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 9.
Required permissions
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
Activities
xbpdpdvmmymdrdc.qnygkxxyyr
xbpdpdvmmymdrdc.bcfuxrwivo
com.red.redgamesdk.GameActivity
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
Activity-related intent filters
xbpdpdvmmymdrdc.qnygkxxyyr
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
166
Uncompressed size
18671513
Highest datetime
2015-02-13 08:26:24
Lowest datetime
2015-02-13 08:24:30
Contained files by extension
png
124
lua
13
xml
7
inl
6
ttf
2
dex
1
MF
1
RSA
1
SF
1
so
1
mp3
1
Contained files by type
PNG
124
unknown
32
XML
7
DEX
1
ELF
1
MP3
1
Compressed bundles
File identification
MD5 51d852d93ea41af435588abba42d20d4
SHA1 b10a5526e544e17c9605e0d9f9962230a9e166b6
SHA256 e3e5e3cbd813f70cb90c12cda62c5e6f73bc22934be298bf5f1ba2f4606a69ed
ssdeep
393216:4lfIv9BqHRnahXOn5o2xraenF9vUSjmro3OKev:4ZeinaCRraWP8Qev

File size 12.9 MB ( 13553147 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android dyn-class contains-elf

VirusTotal metadata
First submission 2015-02-19 12:05:26 UTC ( 3 years, 4 months ago )
Last submission 2016-06-24 15:36:18 UTC ( 1 year, 12 months ago )
File names com.statespotdiscovery.invite.apk
1424665803_com.statespotdiscovery.invite.apk
package.apk
1_dots_line.apk
Dots line.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.INTERNET:com.statespotdiscovery.invite
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
android.intent.action.BATTERY_CHANGED
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
Opened files
/data/data/com.statespotdiscovery.invite/cache/volley
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBTrackingDirectory
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBVideoCompletion
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBRequestManager
/mnt/sdcard/Android/data/com.statespotdiscovery.invite/cache/__chartboost/CBVideoDirectory
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBSessionDirectory
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBSessionDirectory/cb_previous_session_info
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBRequestManager/440014602413
/data/data/com.statespotdiscovery.invite/cache/ads-1439831862.jar
/data/data/com.statespotdiscovery.invite/files
/data/data/com.statespotdiscovery.invite/cache
/data/data/com.statespotdiscovery.invite/cache/com.google.android.gms.ads.appcache
/data/data/com.statespotdiscovery.invite/databases/com.google.android.gms.ads.db
/data
Accessed files
/data/data/com.statespotdiscovery.invite/files
/data/data/com.statespotdiscovery.invite/files/umeng_it.cache
/data/data/com.statespotdiscovery.invite/files/.imprint
/data/data/com.statespotdiscovery.invite/cache/volley
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBRequestManager
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBTrackingDirectory
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBSessionDirectory
/mnt/sdcard/Android/data/com.statespotdiscovery.invite/cache/__chartboost/CBVideoDirectory
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBVideoCompletion
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBSessionDirectory/cb_previous_session_info
/data/data/com.statespotdiscovery.invite/cache/__chartboost/CBRequestManager/440014602413
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.a
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.f
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.e
Contacted URLs
http://apptools.myappblog.net/sdkaccount/wwwsdk/getaccount.php?packName=com.statespotdiscovery.invite&uuid=&isFirst=1
http://apptools.myappblog.net/sdkaccount/wwwsdk/getadpos.php?appPackname=com.statespotdiscovery.invite&packname=online_line&version=0
https://graph.facebook.com/network_ads
https://live.chartboost.com/api/config
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider
https://live.chartboost.com/api/config
https://live.chartboost.com/api/video-prefetch