× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f13349b83d194176eb5a580aa49a37753928011050622d27346a30a23c6165a3
File name: es.cm.android-1.apk
Detection ratio: 0 / 57
Analysis date: 2015-06-18 12:14:08 UTC ( 3 years, 8 months ago ) View latest
Antivirus Result Update
Ad-Aware 20150618
AegisLab 20150618
Yandex 20150618
AhnLab-V3 20150618
Alibaba 20150618
ALYac 20150618
Antiy-AVL 20150618
Arcabit 20150618
Avast 20150618
AVG 20150618
Avira (no cloud) 20150618
AVware 20150618
Baidu-International 20150618
BitDefender 20150618
Bkav 20150618
ByteHero 20150618
CAT-QuickHeal 20150618
ClamAV 20150618
CMC 20150618
Comodo 20150618
Cyren 20150618
DrWeb 20150618
Emsisoft 20150618
ESET-NOD32 20150618
F-Prot 20150618
F-Secure 20150618
Fortinet 20150617
GData 20150618
Ikarus 20150618
Jiangmin 20150615
K7AntiVirus 20150618
K7GW 20150618
Kaspersky 20150618
Kingsoft 20150618
Malwarebytes 20150618
McAfee 20150618
McAfee-GW-Edition 20150617
Microsoft 20150618
eScan 20150618
NANO-Antivirus 20150618
nProtect 20150618
Panda 20150618
Qihoo-360 20150618
Rising 20150618
Sophos AV 20150618
SUPERAntiSpyware 20150618
Symantec 20150618
Tencent 20150618
TheHacker 20150616
TotalDefense 20150617
TrendMicro 20150618
TrendMicro-HouseCall 20150618
VBA32 20150618
VIPRE 20150618
ViRobot 20150618
Zillya 20150618
Zoner 20150618
The file being studied is Android related! APK Android file more specifically. The application's main package name is es.cm.android. The internal version number of the application is 415336. The displayed version string of the application is 4.19. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 11.
Required permissions
android.permission.ACCESS_FINE_LOCATION (fine (GPS) location)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.INTERNET (full Internet access)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.ACCESS_COARSE_LOCATION (coarse (network-based) location)
External libraries
com.google.android.maps
Activities
es.cm.android.activity.SplashActivity
es.cm.android.activity.HomeActivity
es.cm.android.activity.OfmovilActivity
es.cm.android.activity.FinderActivity
es.cm.android.finder.AssetListActivity
es.cm.android.finder.RouteActivity
Providers
android.support.v4.content.FileProvider
Activity-related intent filters
es.cm.android.activity.SplashActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
es.cm.android.activity.FinderActivity
actions: android.intent.action.SEARCH
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1282
Uncompressed size
3663977
Highest datetime
2015-06-18 09:24:10
Lowest datetime
2015-02-03 11:50:16
Contained files by extension
png
565
xml
428
otf
3
gif
1
Contained files by type
PNG
564
XML
428
unknown
6
HTML
1
GIF
1
File identification
MD5 0cfb50758c6338dfc4c84fef6e18f9ce
SHA1 ef3989782e835ebfaf627804d8b437996ce80366
SHA256 f13349b83d194176eb5a580aa49a37753928011050622d27346a30a23c6165a3
ssdeep
98304:F6n6YwjVPUmTnMN4VBc00IpuhQfPmdq5G2pLSqfJ22K1WMx0BbULOoo3B:swPhTa4XL7pu+2dqgWSqGox

File size 4.4 MB ( 4656034 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2015-06-18 12:14:08 UTC ( 3 years, 8 months ago )
Last submission 2016-10-23 06:21:50 UTC ( 2 years, 3 months ago )
File names es.cm.android-1.apk
bankia.apk
060ac571a6294213ec0b375973a5693d1c2110d69882a7cdcfbf47341b2d18c162369c85bfd4c59d295689e32535cb83b95129d2c86c6366c506c2d73d4f64d5
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Started receivers
android.net.conn.CONNECTIVITY_CHANGE
Opened files
/data/data/es.cm.android/cache/pdfs
/data/data/es.cm.android/files/gaClientId
/data/data/es.cm.android/files/gaInstallData
/data/data/es.cm.android/cache/messageImages
/data/data/es.cm.android/cache/adbdownloadcache
APP_ASSETS/ADBMobileConfig.json
/data/data/es.cm.android/cache/ADBMobileDataCache.sqlite
Accessed files
/data/data/es.cm.android/cache/adbdownloadcache
/data/data/es.cm.android/cache/messageImages
/data/data/es.cm.android/cacheADBMobileDataCache.sqlite
/data/data/es.cm.android/files/gaOptOut
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Contacted URLs
http://m.bankia.es/PMOVILES/services/links.json
http://m.bankia.es/PMOVILES/services/broker.json/valores=BKIA.MC;.IBEX;
http://m.bankia.es/PMOVILES/services/eco/list.json/featured
http://m.bankia.es/PMOVILES/services/twitter.json
https://assets.adobedtm.com/b213090c5204bf94318f4ef0539a38b487d10368/scripts/satellite-54cb4a4d38376313087d0000.json
https://assets.adobedtm.com/b213090c5204bf94318f4ef0539a38b487d10368/scripts/satellite-54cb4a4d3837630019560600.json
http://bankia.sc.omtrdc.net/id
http://bankia.sc.omtrdc.net/b/ss/bankiaaplicaciones/0/JAVA-4.4.0-AN/s63811961