× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ebec60621743101ec82423e49337189385afc50eff66394268a9ac8adc5ef194
File name: com.Nanali.SallysLaw.39.apk
Detection ratio: 5 / 59
Analysis date: 2017-04-20 09:21:55 UTC ( 2 years, 1 month ago ) View latest
Antivirus Result Update
AegisLab Android.G2P.Cj!c 20170420
AVG Android/G2P.CJ.2A4020D56C88 20170420
TrendMicro-HouseCall Suspicious_GEN.F47V0101 20170420
Webroot W32.Malware.Gen 20170420
WhiteArmor Android-PUA.SN-Sure.36373246233837576144080650.[PUA] 20170409
Ad-Aware 20170420
AhnLab-V3 20170420
Alibaba 20170420
ALYac 20170420
Antiy-AVL 20170420
Arcabit 20170420
Avast 20170420
Avira (no cloud) 20170420
AVware 20170420
Baidu 20170420
BitDefender 20170420
CAT-QuickHeal 20170420
ClamAV 20170420
CMC 20170420
Comodo 20170420
CrowdStrike Falcon (ML) 20170419
Cyren 20170420
DrWeb 20170420
Emsisoft 20170420
Endgame 20170419
ESET-NOD32 20170420
F-Prot 20170420
F-Secure 20170420
Fortinet 20170420
GData 20170420
Ikarus 20170420
Sophos ML 20170413
Jiangmin 20170420
K7AntiVirus 20170420
K7GW 20170420
Kaspersky 20170420
Kingsoft 20170420
Malwarebytes 20170420
McAfee 20170420
McAfee-GW-Edition 20170419
Microsoft 20170420
eScan 20170420
NANO-Antivirus 20170420
nProtect 20170420
Palo Alto Networks (Known Signatures) 20170420
Panda 20170419
Qihoo-360 20170420
Rising 20170420
SentinelOne (Static ML) 20170330
Sophos AV 20170420
SUPERAntiSpyware 20170420
Symantec 20170419
Symantec Mobile Insight 20170414
Tencent 20170420
TheHacker 20170419
TrendMicro 20170420
Trustlook 20170420
VBA32 20170420
VIPRE 20170420
ViRobot 20170420
Yandex 20170419
Zillya 20170418
ZoneAlarm by Check Point 20170420
Zoner 20170420
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.Nanali.SallysLaw. The internal version number of the application is 39. The displayed version string of the application is 1.0.61. The minimum Android API level for the application to run (MinSDKVersion) is 11. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.INTERNET (full Internet access)
com.Nanali.SallysLaw.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.androidnative.gms.core.GooglePlaySupportActivity
com.androidnative.AndroidNativeProxy
com.unity3d.player.UnityPlayerActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.androidnative.features.social.common.SocialProxyActivity
com.facebook.unity.FBUnityDialogsActivity
com.androidnative.billing.core.AN_BillingProxyActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.TJContentActivity
com.tapjoy.mraid.view.Browser
com.tapjoy.mraid.view.ActionHandler
Receivers
com.tapjoy.InstallReferrerReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
968
Uncompressed size
425916912
Highest datetime
2016-10-31 13:28:02
Lowest datetime
2016-09-29 16:35:56
Contained files by extension
dll
15
png
9
xml
3
so
3
dex
1
MF
1
RSA
1
js
1
SF
1
Contained files by type
unknown
936
Portable Executable
15
PNG
9
XML
3
ELF
3
DEX
1
ZIP
1
File identification
MD5 9ef170c95794b9c34dc778b90a9e3dc2
SHA1 245af0748e1fa55f9a5920dc3454826ead48dc44
SHA256 ebec60621743101ec82423e49337189385afc50eff66394268a9ac8adc5ef194
ssdeep
786432:864mKo5DQXRmQoq4UMrINhiGFkxfOAIGX4ilf7YRqQm4PrAtVX+LGDYwEJRXQZ8+:74vo5DvQoq4UIIGWYnV7fURqtykb+qCM

File size 37.9 MB ( 39748861 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (91.3%)
ZIP compressed archive (6.9%)
PrintFox/Pagefox bitmap (var. P) (1.7%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2016-11-04 16:26:45 UTC ( 2 years, 6 months ago )
Last submission 2017-04-20 09:21:55 UTC ( 2 years, 1 month ago )
File names com.Nanali.SallysLaw.39.apk
Sally v1.0.61_mod.apk
1479346458_1_sallys_law.apk
1_sallys_law.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!