× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ef6464b11e0e33e1ff1794197c2ed7c805d05a59493191b053acd40a0c5c64bd
File name: 1393485690_com.catfishblues.cavedrush.apk
Detection ratio: 5 / 56
Analysis date: 2016-06-25 14:20:46 UTC ( 2 years, 5 months ago ) View latest
Antivirus Result Update
AegisLab Android.Ctl2.Hgi!c 20160624
AVG Android_ctl2.HGI 20160625
Cyren AndroidOS/GenPua.2371DA78!Olympus 20160625
ESET-NOD32 a variant of Android/AdDisplay.AppFlood.A potentially unwanted 20160625
Ikarus PUA.AndroidOS.Appflood 20160625
Ad-Aware 20160625
AhnLab-V3 20160625
Alibaba 20160624
ALYac 20160625
Antiy-AVL 20160625
Arcabit 20160625
Avast 20160625
Avira (no cloud) 20160625
AVware 20160625
Baidu 20160624
Baidu-International 20160614
BitDefender 20160625
Bkav 20160625
CAT-QuickHeal 20160625
ClamAV 20160625
CMC 20160620
Comodo 20160625
DrWeb 20160625
Emsisoft 20160625
F-Prot 20160625
F-Secure 20160625
Fortinet 20160625
GData 20160625
Jiangmin 20160625
K7AntiVirus 20160625
K7GW 20160625
Kaspersky 20160625
Kingsoft 20160625
Malwarebytes 20160625
McAfee 20160625
McAfee-GW-Edition 20160625
Microsoft 20160625
eScan 20160625
NANO-Antivirus 20160625
nProtect 20160624
Panda 20160625
Qihoo-360 20160625
Sophos AV 20160625
SUPERAntiSpyware 20160625
Symantec 20160625
Tencent 20160625
TheHacker 20160625
TotalDefense 20160625
TrendMicro 20160625
TrendMicro-HouseCall 20160625
VBA32 20160624
VIPRE 20160625
ViRobot 20160625
Yandex 20160625
Zillya 20160624
Zoner 20160625
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.CatfishBlues.CaveDRush. The internal version number of the application is 8. The displayed version string of the application is 1.0.2. The minimum Android API level for the application to run (MinSDKVersion) is 8. The target Android API level for the application to run (TargetSDKVersion) is 15.
Required permissions
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerProxyActivity
com.unity3d.player.UnityPlayerActivity
com.unity3d.player.UnityPlayerNativeActivity
com.unity3d.player.VideoPlayer
com.prime31.EtceteraProxyActivity
com.chartboost.sdk.CBDialogActivity
com.chartboost.sdk.CBImpressionActivity
com.appbrain.AppBrainActivity
com.tapjoy.TJCOffersWebView
com.tapjoy.TapjoyFullScreenAdWebView
com.tapjoy.TapjoyVideoView
com.tapjoy.TapjoyDailyRewardAdWebView
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.appflood.AFFullScreenActivity
com.google.ads.AdActivity
com.prime31.PlayServicesProxyActivity
com.prime31.GoogleIABProxyActivity
Services
com.appbrain.AppBrainService
Receivers
com.appbrain.ReferrerReceiver
com.google.ads.InstallReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerProxyActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.ads.InstallReceiver
actions: com.android.vending.INSTALL_REFERRER
com.appbrain.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
422
Uncompressed size
71753755
Highest datetime
2014-01-20 20:45:48
Lowest datetime
2013-05-07 11:47:38
Contained files by extension
dll
11
png
5
so
4
xml
2
dex
1
MF
1
SF
1
DSA
1
Contained files by type
unknown
400
Portable Executable
11
PNG
5
ELF
4
DEX
1
XML
1
File identification
MD5 2371da787c082213110917a7945a04b6
SHA1 8086566383c2a3267bb0ba4be0baa483e2003d64
SHA256 ef6464b11e0e33e1ff1794197c2ed7c805d05a59493191b053acd40a0c5c64bd
ssdeep
786432:NcptFVu+rXVWvwCMhT1Nlzby6oplO2+vT2rkGh2N7gzXOo0TvVFKTXnRB:NcrbrXVWyhTNPEsZvdGwxgzeowajnRB

File size 28.4 MB ( 29760119 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (72.9%)
Java Archive (20.1%)
ZIP compressed archive (5.5%)
PrintFox/Pagefox bitmap (var. P) (1.3%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2014-01-26 13:12:26 UTC ( 4 years, 10 months ago )
Last submission 2018-09-26 04:24:05 UTC ( 2 months, 2 weeks ago )
File names EF6464B11E0E33E1FF1794197C2ED7C805D05A59493191B053ACD40A0C5C64BD
com.CatfishBlues.CaveDRush.apk
Caveman_Dino_Rush-1.0.2.apk
-ijFblBc6l3apicOxO4ARlj8FLp2rNmu.apk
caveman-dino-rush-v1.0.2.apk
caveman_dino_rush.apk
1_caveman_dino_rush.apk
Caveman-Dino-Rush-1.0.2_apk-mod.ru.apk
1393485690_com.catfishblues.cavedrush.apk
1391064511_com.catfishblues.cavedrush.apk
1391156815_com.catfishblues.cavedrush.apk
Advanced heuristic and reputation engines
ClamAV
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: https://www.clamav.net/documents/potentially-unwanted-applications-pua .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!