× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f2f2ddc014caff66f31d6c04cc14ab57446e072954f8a8c3b7240611711b0301
File name: 3013157dd4c257bd46c19912c8517bde7778c3f02e2263eac96c3479faffbcc71...
Detection ratio: 0 / 55
Analysis date: 2016-09-26 05:08:58 UTC ( 2 years, 4 months ago ) View latest
Antivirus Result Update
Ad-Aware 20160926
AegisLab 20160926
AhnLab-V3 20160925
Alibaba 20160926
ALYac 20160926
Antiy-AVL 20160926
Arcabit 20160926
Avast 20160926
AVG 20160926
Avira (no cloud) 20160925
AVware 20160926
Baidu 20160924
BitDefender 20160926
Bkav 20160924
CAT-QuickHeal 20160924
ClamAV 20160926
CMC 20160921
Comodo 20160926
Cyren 20160926
DrWeb 20160926
Emsisoft 20160926
ESET-NOD32 20160925
F-Prot 20160925
F-Secure 20160926
Fortinet 20160926
GData 20160926
Ikarus 20160925
Jiangmin 20160926
K7AntiVirus 20160925
K7GW 20160926
Kaspersky 20160926
Kingsoft 20160926
Malwarebytes 20160925
McAfee 20160923
McAfee-GW-Edition 20160926
Microsoft 20160926
eScan 20160926
NANO-Antivirus 20160926
nProtect 20160926
Panda 20160925
Qihoo-360 20160926
Rising 20160926
Sophos AV 20160926
SUPERAntiSpyware 20160925
Symantec 20160926
Tencent 20160926
TheHacker 20160926
TrendMicro 20160926
TrendMicro-HouseCall 20160926
VBA32 20160923
VIPRE 20160926
ViRobot 20160926
Yandex 20160925
Zillya 20160924
Zoner 20160926
The file being studied is Android related! APK Android file more specifically. The application's main package name is tw.mobileapp.qrcode.banner. The internal version number of the application is 162. The displayed version string of the application is 1.6.2. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 23.
Required permissions
android.permission.CAMERA (take pictures and videos)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
Activities
tw.mobileapp.qrcode.banner.CaptureActivity
tw.mobileapp.qrcode.banner.CaptureDecodeActivity
tw.mobileapp.qrcode.banner.QRIntroduction
tw.mobileapp.qrcode.banner.HistoryView
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
Activity-related intent filters
tw.mobileapp.qrcode.banner.CaptureActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
228
Uncompressed size
5517401
Highest datetime
2016-08-31 10:03:14
Lowest datetime
2016-08-25 16:58:28
Contained files by extension
png
196
xml
26
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
196
XML
25
unknown
6
DEX
1
File identification
MD5 31f276e1c57909e3ad93c00526c2ec12
SHA1 dbb47aff742d5826bbddfb87e86439389ed21439
SHA256 f2f2ddc014caff66f31d6c04cc14ab57446e072954f8a8c3b7240611711b0301
ssdeep
49152:EO7caCO1md6L3o2f2N5CBrq62uBkha2hfU64S1vs8zEBb3XbLNf7:EOYCYdEfOC1ouBkhLhs6HZs8zEBb3Xbd

File size 2.1 MB ( 2210721 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android dyn-class

VirusTotal metadata
First submission 2016-09-01 02:40:59 UTC ( 2 years, 5 months ago )
Last submission 2018-01-15 03:07:44 UTC ( 1 year, 1 month ago )
File names QR Code Reader_1.6.2.apk
qr-code-reader.apk
tw.mobileapp.qrcode.banner.apk
base.apk
PdM6q7nyEUAC85NPn9Wz20171009-6230-6s9b43
3013157dd4c257bd46c19912c8517bde7778c3f02e2263eac96c3479faffbcc7138c681c73d6d0dfa8c2217f05d80073fe826b98a71bf739f74e2db66071fe8d
qr-code-reader.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.ACCESS_NETWORK_STATE:tw.mobileapp.qrcode.banner
android.permission.INTERNET:tw.mobileapp.qrcode.banner
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
android.intent.action.BATTERY_CHANGED
Opened files
https:/googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.dex
/data/data/tw.mobileapp.qrcode.banner/databases/com.google.android.gms.ads.db
Accessed files
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.jar
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.tmp
/data/data/tw.mobileapp.qrcode.banner/cache/1460683162801.dex
Interesting calls
Calls APIs that provide access to information about the telephony services on the device. Applications can use such methods to determine telephony services and states, as well as to access some types of subscriber information.
Dynamically loaded classes
com.google.android.ads.zxxz.h
com.google.android.ads.zxxz.g
com.google.android.ads.zxxz.l
com.google.android.ads.zxxz.m
com.google.android.ads.zxxz.b
com.google.android.ads.zxxz.d
com.google.android.ads.zxxz.c
com.google.android.ads.zxxz.f
com.google.android.ads.zxxz.o
com.google.android.ads.zxxz.a
com.google.android.ads.zxxz.i
com.google.android.ads.zxxz.e
com.google.android.ads.zxxz.n
com.google.android.ads.zxxz.j
com.google.android.ads.zxxz.k
Accessed URIs
geo:0,0?q=donuts
http://www.google.com
market://details?id=com.google.android.gms.ads
http://www.example.com
https://googleads.g.doubleclick.net/mads/static/mad/sdk/native/sdk-core-v40.html