× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ece5aabe08907c48b5a8bf5628f592eb4684c800dd20b65816af40b12c255f95
File name: 1019574_52f519_com.mindy.grap1_2.2.0_2020002.apk
Detection ratio: 0 / 62
Analysis date: 2018-12-13 12:42:09 UTC ( 5 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20181213
AegisLab 20181213
AhnLab-V3 20181213
Alibaba 20180921
ALYac 20181213
Antiy-AVL 20181213
Arcabit 20181213
Avast 20181213
Avast-Mobile 20181213
AVG 20181213
Avira (no cloud) 20181213
Babable 20180918
Baidu 20181207
BitDefender 20181213
Bkav 20181213
CAT-QuickHeal 20181212
ClamAV 20181213
CMC 20181212
Comodo 20181213
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20181213
Cyren 20181213
DrWeb 20181213
eGambit 20181213
Emsisoft 20181213
Endgame 20181108
ESET-NOD32 20181213
F-Prot 20181213
F-Secure 20181213
Fortinet 20181213
GData 20181213
Ikarus 20181213
Sophos ML 20181128
Jiangmin 20181213
K7AntiVirus 20181213
K7GW 20181213
Kaspersky 20181213
Kingsoft 20181213
Malwarebytes 20181213
MAX 20181213
McAfee 20181213
McAfee-GW-Edition 20181213
Microsoft 20181213
eScan 20181213
NANO-Antivirus 20181213
Palo Alto Networks (Known Signatures) 20181213
Panda 20181212
Qihoo-360 20181213
Rising 20181213
SentinelOne (Static ML) 20181011
Sophos AV 20181213
SUPERAntiSpyware 20181212
Symantec 20181213
Symantec Mobile Insight 20181212
TACHYON 20181213
Tencent 20181213
TheHacker 20181210
TotalDefense 20181213
Trapmine 20181205
TrendMicro 20181213
TrendMicro-HouseCall 20181213
Trustlook 20181213
VBA32 20181212
VIPRE 20181213
ViRobot 20181213
Webroot 20181213
Yandex 20181213
Zillya 20181212
ZoneAlarm by Check Point 20181213
Zoner 20181213
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.mindy.grap1. The internal version number of the application is 2020002. The displayed version string of the application is 2.2.0. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 28.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.VIBRATE (control vibrator)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.unity.FBUnityAppLinkActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.facebook.unity.FBUnityGameRequestActivity
com.facebook.unity.FBUnityCreateGameGroupActivity
com.facebook.unity.FBUnityJoinGameGroupActivity
com.facebook.unity.AppInviteDialogActivity
com.mopub.common.privacy.ConsentDialogActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.mobileads.RewardedMraidActivity
com.mopub.mobileads.MraidVideoPlayerActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.applovin.sdk.AppLovinWebViewActivity
com.vungle.warren.ui.VungleActivity
com.vungle.warren.ui.VungleFlexViewActivity
com.vungle.warren.ui.VungleWebViewActivity
com.facebook.ads.AudienceNetworkActivity
com.unity.purchasing.googleplay.PurchaseActivity
com.unity.purchasing.googleplay.VRPurchaseActivity
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitTransparentActivity
com.unity3d.ads.adunit.AdUnitTransparentSoftwareActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.flurry.android.FlurryFullscreenTakeoverActivity
com.ironsource.sdk.controller.ControllerActivity
com.ironsource.sdk.controller.InterstitialActivity
com.ironsource.sdk.controller.OpenUrlActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.tapjoy.TJContentActivity
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
Services
com.vungle.publisher.VungleService
Receivers
com.tenjin.android.TenjinReferrerReceiver
com.vungle.warren.NetworkStateReceiver
Providers
com.facebook.FacebookContentProvider
com.google.android.gms.ads.MobileAdsInitProvider
Activity-related intent filters
com.unity.purchasing.googleplay.VRPurchaseActivity
actions: com.google.vr.vrcore.ACTION_NONE
categories: com.google.intent.category.DAYDREAM
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
Receiver-related intent filters
com.tenjin.android.TenjinReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.vungle.warren.NetworkStateReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
893
Uncompressed size
105421448
Highest datetime
2018-12-11 05:33:38
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
338
xml
197
dll
99
so
10
dex
2
MF
1
gz
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
338
unknown
247
XML
197
Portable Executable
99
ELF
10
DEX
2
File identification
MD5 0d94cbfe06f4e0b0b0eb6df412edd6ba
SHA1 107e6855092a60dda6964e607b855759a731e0cc
SHA256 ece5aabe08907c48b5a8bf5628f592eb4684c800dd20b65816af40b12c255f95
ssdeep
1572864:9UnqeoCv14+9TLGLszNdQJ3UwX0gI7TsqzcUgJ4zGibO:9UnqeoElUsJd8Eo0JsWL8gNi

File size 52.4 MB ( 54965996 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2018-12-12 09:42:49 UTC ( 5 months, 1 week ago )
Last submission 2019-03-04 08:27:42 UTC ( 2 months, 2 weeks ago )
File names 0D94CBFE06F4E0B0B0EB6DF412EDD6BA
com.mindy.grap1.apk
iPeADUPbUS8HsR7y7zqt20181212-31849-11k0dmx
1019574_52f519_com.mindy.grap1_2.2.0_2020002.apk
base.apk
stickman-hook.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!