× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e6f624597499d7c533b03018aaf8b6acb8fb39af420462368e2a13391bd4f95e
File name: DeadTrigger2 1.2.1_.apk
Detection ratio: 0 / 55
Analysis date: 2017-01-11 05:54:18 UTC ( 2 years, 2 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170111
AegisLab 20170111
AhnLab-V3 20170110
Alibaba 20170111
ALYac 20170111
Antiy-AVL 20170111
Arcabit 20170111
Avast 20170111
AVG 20170110
Avira (no cloud) 20170110
AVware 20170111
Baidu 20170110
BitDefender 20170111
Bkav 20170110
CAT-QuickHeal 20170110
ClamAV 20170111
CMC 20170110
Comodo 20170111
CrowdStrike Falcon (ML) 20161024
Cyren 20170111
DrWeb 20170111
Emsisoft 20170111
ESET-NOD32 20170111
F-Prot 20170111
F-Secure 20170111
Fortinet 20170111
GData 20170111
Sophos ML 20161216
Jiangmin 20170111
K7AntiVirus 20170110
K7GW 20170111
Kaspersky 20170111
Kingsoft 20170111
Malwarebytes 20170111
McAfee 20170108
McAfee-GW-Edition 20170111
Microsoft 20170111
eScan 20170110
NANO-Antivirus 20170111
nProtect 20170111
Panda 20170110
Qihoo-360 20170111
Rising 20170111
Sophos AV 20170110
SUPERAntiSpyware 20170111
Tencent 20170111
TheHacker 20170108
TrendMicro 20170111
TrendMicro-HouseCall 20170111
Trustlook 20170111
VBA32 20170110
VIPRE 20170111
ViRobot 20170111
WhiteArmor 20170109
Yandex 20170110
Zillya 20170110
Zoner 20170111
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.madfingergames.deadtrigger2. The internal version number of the application is 12122. The displayed version string of the application is 1.2.1. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.READ_EXTERNAL_STORAGE (read from external storage)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.htc.launcher.permission.UPDATE_SHORTCUT (Unknown permission from android reference)
com.sec.android.provider.badge.permission.READ (Unknown permission from android reference)
com.majeur.launcher.permission.UPDATE_BADGE (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
com.madfingergames.deadtrigger2.permission.C2D_MESSAGE (C2DM permission.)
android.permission.BROADCAST_STICKY (send sticky broadcast)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.htc.launcher.permission.READ_SETTINGS (Unknown permission from android reference)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
com.sonyericsson.home.permission.BROADCAST_BADGE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
com.sec.android.provider.badge.permission.WRITE (Unknown permission from android reference)
com.anddoes.launcher.permission.UPDATE_COUNT (Unknown permission from android reference)
Activities
com.madfingergames.unityplayer.MFUnityPlayerNativeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
com.madfingergames.billing.samsungapps.BillingProxyActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.prime31.EtceteraProxyActivity
com.prime31.WebViewActivity
com.prime31.P31VideoPlayerActivity
com.unity3d.player.VideoPlayer
com.google.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.chartboost.sdk.CBImpressionActivity
com.madfingergames.billing.googleplay.v3.BillingProxyActivity
com.nativex.monetization.activities.InterstitialActivity
com.nativex.videoplayer.VideoActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.pushwoosh.richpages.RichPageActivity
com.pushwoosh.MessageActivity
com.pushwoosh.PushHandlerActivity
com.supersonicads.sdk.controller.ControllerActivity
com.supersonicads.sdk.controller.InterstitialActivity
com.supersonicads.sdk.controller.OpenUrlActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.onevcat.uniwebview.AndroidPlugin
com.onevcat.uniwebview.UniWebViewCustomViewActivity
com.vungle.publisher.FullScreenAdActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
Services
com.unity3d.plugin.downloader.UnityDownloaderService
com.pushwoosh.GCMListenerService
com.pushwoosh.GCMInstanceIDListenerService
com.pushwoosh.GCMRegistrationService
Receivers
com.unity3d.plugin.downloader.UnityAlarmReceiver
com.prime31.AlarmManagerReceiver
com.madfingergames.plugins.BroadcastReceiversTransmitter
com.madfingergames.plugins.AppsFlyerInstallBroadcastReceiver
com.nativex.DeepLinkReceiver
com.google.android.gms.gcm.GcmReceiver
com.pushwoosh.local.AlarmReceiver
com.pushwoosh.local.BootReceiver
com.tapjoy.InstallReferrerReceiver
com.madfingergames.plugins.TrackingReceiver
Service-related intent filters
com.pushwoosh.GCMListenerService
actions: com.google.android.c2dm.intent.RECEIVE
com.pushwoosh.GCMInstanceIDListenerService
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
com.madfingergames.unityplayer.MFUnityPlayerNativeActivity
actions: android.intent.action.MAIN, com.madfingergames.deadtrigger2.MESSAGE, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.nativex.DeepLinkReceiver
actions: com.nativex.action.DEEPLINK
com.madfingergames.plugins.BroadcastReceiversTransmitter
actions: com.android.vending.INSTALL_REFERRER
com.madfingergames.plugins.TrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
com.pushwoosh.local.BootReceiver
actions: android.intent.action.BOOT_COMPLETED
categories: android.intent.category.DEFAULT
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.madfingergames.plugins.AppsFlyerInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.madfingergames.deadtrigger2
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
401
Uncompressed size
66029407
Highest datetime
2016-12-20 16:27:58
Lowest datetime
1980-01-01 01:00:00
Contained files by extension
png
298
xml
58
dll
20
so
8
dex
1
MF
1
zip
1
mdb
1
RSA
1
js
1
txt
1
wav
1
SF
1
Contained files by type
PNG
298
XML
58
Portable Executable
20
unknown
15
ELF
8
DEX
1
ZIP
1
File identification
MD5 5898cad47d9dd98af538771ea14c34b7
SHA1 a5b97e5e8965d7959f9b5703110e3bbe1dfd4672
SHA256 e6f624597499d7c533b03018aaf8b6acb8fb39af420462368e2a13391bd4f95e
ssdeep
786432:GA5cdiH6fLGHOTanOVDY/rktWf60oZRuvDfira:95fafLGuTanGErdoavGa

File size 24.8 MB ( 25982752 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk contains-pe dyn-calls android contains-elf

VirusTotal metadata
First submission 2016-12-20 23:24:41 UTC ( 2 years, 2 months ago )
Last submission 2018-05-27 12:51:40 UTC ( 9 months, 3 weeks ago )
File names DeadTrigger2 1.2.1_.apk
dead-trigger-2.apk
DEAD TRIGGER 2_v1.2.1_apkpure.com.apk
base.apk
com.madfingergames.deadtrigger2-12122.apk
DEAD_TRIGGER_2_v1.2.1_apkpure.com.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
/data/data/com.madfingergames.deadtrigger2/files/AFRequestCache
Accessed files
/data/data/com.madfingergames.deadtrigger2/files
/data/app/com.madfingergames.deadtrigger2-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.madfingergames.deadtrigger2
/data/data/com.madfingergames.deadtrigger2/files/AFRequestCache
/data/data/com.madfingergames.deadtrigger2/files/AF_INSTALLATION
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically called methods
android.telephony.TelephonyManager.getDeviceId
Contacted URLs
https://t.appsflyer.com/api/v4/androidevent?buildnumber=3.3&app_id=com.madfingergames.deadtrigger2
Accessed URIs
content://com.facebook.katana.provider.AttributionIdProvider