× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f1a94cf414d2e55e78fb8dab430e6f817a7a1ec68805fdf6de058e2b20a2c94c
File name: base.apk
Detection ratio: 0 / 60
Analysis date: 2018-09-03 17:12:14 UTC ( 6 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20180903
AegisLab 20180903
AhnLab-V3 20180903
Alibaba 20180713
ALYac 20180903
Antiy-AVL 20180903
Arcabit 20180903
Avast 20180903
Avast-Mobile 20180903
AVG 20180903
Avira (no cloud) 20180903
AVware 20180823
Babable 20180902
Baidu 20180903
BitDefender 20180903
Bkav 20180831
CAT-QuickHeal 20180902
ClamAV 20180903
CMC 20180903
Comodo 20180903
CrowdStrike Falcon (ML) 20180202
Cybereason 20180308
Cylance 20180903
Cyren 20180903
DrWeb 20180903
eGambit 20180903
Emsisoft 20180903
Endgame 20180730
ESET-NOD32 20180903
F-Prot 20180903
F-Secure 20180903
Fortinet 20180903
GData 20180903
Sophos ML 20180717
Jiangmin 20180903
K7AntiVirus 20180903
K7GW 20180903
Kaspersky 20180903
Kingsoft 20180903
Malwarebytes 20180903
MAX 20180903
McAfee 20180903
McAfee-GW-Edition 20180903
Microsoft 20180903
eScan 20180903
NANO-Antivirus 20180903
Palo Alto Networks (Known Signatures) 20180903
Panda 20180903
Qihoo-360 20180903
Rising 20180903
SentinelOne (Static ML) 20180830
Sophos AV 20180903
SUPERAntiSpyware 20180902
Symantec 20180903
Symantec Mobile Insight 20180831
TACHYON 20180903
Tencent 20180903
TheHacker 20180902
TrendMicro 20180903
TrendMicro-HouseCall 20180903
Trustlook 20180903
VBA32 20180903
VIPRE 20180903
ViRobot 20180903
Webroot 20180903
Yandex 20180903
Zillya 20180831
ZoneAlarm by Check Point 20180903
Zoner 20180903
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.aniplex.fategrandorder.en. The internal version number of the application is 50. The displayed version string of the application is 1.20.0. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.DEVICE_POWER (turn phone on or off)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.INTERNET (full Internet access)
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.RECEIVE (Unknown permission from android reference)
com.android.vending.BILLING (Unknown permission from android reference)
com.aniplex.fategrandorder.en.permission.C2D_MESSAGE (C2DM permission.)
Activities
jp.delightworks.Fgo.player.AndroidPlugin
com.unity3d.player.UnityPlayerNativeActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
jp.delightworks.unityplugin.webview.WebViewActivity
com.unity3d.player.VideoPlayer
Services
com.appsflyer.InstanceIDListener
com.insalgo.notificationservice.NotificationService
Receivers
com.appsflyer.MultipleInstallBroadcastReceiver
com.metaps.analytics.AnalyticsReceiver
com.metaps.analytics.GcmReceiver
com.metaps.analytics.ReadReceiver
com.google.android.gms.gcm.GcmReceiver
com.insalgo.notificationservice.MyRebootReceiver
com.insalgo.notificationservice.ShutdownReceiver
Service-related intent filters
com.appsflyer.InstanceIDListener
actions: com.google.android.gms.iid.InstanceID
Activity-related intent filters
jp.delightworks.Fgo.player.AndroidPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.insalgo.notificationservice.MyRebootReceiver
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
com.google.android.gms.gcm.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.metaps.analytics.AnalyticsReceiver
actions: com.android.vending.INSTALL_REFERRER
com.metaps.analytics.GcmReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.aniplex.fategrandorder.en
com.insalgo.notificationservice.ShutdownReceiver
actions: android.intent.action.ACTION_SHUTDOWN, android.intent.action.QUICKBOOT_POWEROFF
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
Contained files
Compression metadata
Contained files
1348
Uncompressed size
46008134
Highest datetime
2018-08-22 16:29:46
Lowest datetime
2018-08-22 16:23:54
Contained files by extension
dll
13
xml
1
MF
1
mdb
1
RSA
1
SF
1
Contained files by type
unknown
986
Portable Executable
13
XML
1
File identification
MD5 415bfda9ea550e9753c092b23f6c4215
SHA1 4cece69fd965618f8fd1e4fca89ab8ae94ded7d0
SHA256 f1a94cf414d2e55e78fb8dab430e6f817a7a1ec68805fdf6de058e2b20a2c94c
ssdeep
1572864:1mwkmb9jmWx/uH1EGR7B1Mgr7DYts/it6Ug/ZRj7F6y6fuNfyra0oIbj1:wejNx/k1EqjMgr70t6UGPFd6fMZIX1

File size 56.0 MB ( 58690449 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (54.7%)
Mozilla Archive Format (gen) (26.4%)
ZIP compressed archive (15.0%)
PrintFox/Pagefox bitmap (var. P) (3.7%)
Tags
apk contains-pe android

VirusTotal metadata
First submission 2018-08-23 07:09:15 UTC ( 7 months ago )
Last submission 2019-02-14 08:43:47 UTC ( 1 month, 1 week ago )
File names fate-grand-order-english.apk
base.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!