× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: f865b07ef25a722a926fef29deeb52028fddfd14e55edb9c23524b191f734479
File name: filename
Detection ratio: 0 / 56
Analysis date: 2016-04-17 08:27:36 UTC ( 3 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20160417
AegisLab 20160417
AhnLab-V3 20160416
Alibaba 20160415
ALYac 20160417
Antiy-AVL 20160416
Arcabit 20160417
Avast 20160417
AVG 20160417
Avira (no cloud) 20160416
AVware 20160417
Baidu 20160416
Baidu-International 20160416
BitDefender 20160417
Bkav 20160415
CAT-QuickHeal 20160416
ClamAV 20160417
CMC 20160415
Comodo 20160416
Cyren 20160417
DrWeb 20160417
Emsisoft 20160417
ESET-NOD32 20160416
F-Prot 20160417
F-Secure 20160417
Fortinet 20160417
GData 20160417
Ikarus 20160416
Jiangmin 20160417
K7AntiVirus 20160417
K7GW 20160417
Kaspersky 20160417
Kingsoft 20160417
Malwarebytes 20160417
McAfee 20160417
McAfee-GW-Edition 20160416
Microsoft 20160417
eScan 20160417
NANO-Antivirus 20160417
Panda 20160416
Qihoo-360 20160417
Rising 20160417
Sophos AV 20160417
SUPERAntiSpyware 20160417
Symantec 20160417
Tencent 20160417
TheHacker 20160416
TotalDefense 20160417
TrendMicro 20160417
TrendMicro-HouseCall 20160417
VBA32 20160415
VIPRE 20160417
ViRobot 20160417
Yandex 20160416
Zillya 20160416
Zoner 20160417
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.mobage.ww.a1903.SWTD_Android. The internal version number of the application is 52. The displayed version string of the application is 2.0.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 21.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.READ_PHONE_STATE (read phone state and identity)
com.mobage.ww.a1903.SWTD_Android.permission.RECEIVE_ADM_MESSAGE (Unknown permission from android reference)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
com.amazon.device.messaging.permission.RECEIVE (Unknown permission from android reference)
Activities
com.unity3d.player.UnityPlayerNativeActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.onevcat.uniwebview.UniWebViewCustomViewActivity
com.dena.west.lcd.sdk.internal.web.SDKWebViewProxyActivity
com.amazon.identity.auth.device.authorization.AuthorizationActivity
Services
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler
com.dena.west.lcd.sdk.internal.notification.GcmIntentService
Receivers
com.adjust.sdk.ReferrerReceiver
com.adjust.sdk.AdjustReferrerReceiver
com.dena.west.lcd.sdk.internal.notification.GcmBroadcastReceiver
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler$Receiver
com.amazon.device.iap.ResponseReceiver
com.dena.west.lcd.sdk.internal.receiver.ReferrerReceiver
Activity-related intent filters
com.unity3d.player.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER, android.intent.category.LEANBACK_LAUNCHER
com.amazon.identity.auth.device.authorization.AuthorizationActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.dena.west.lcd.sdk.internal.notification.GcmBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE
categories: com.mobage.ww.a1903.SWTD_Android
com.dena.west.lcd.sdk.internal.notification.ADMMessageHandler$Receiver
actions: com.amazon.device.messaging.intent.REGISTRATION, com.amazon.device.messaging.intent.RECEIVE
categories: com.mobage.ww.a1903.SWTD_Android
com.dena.west.lcd.sdk.internal.receiver.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.adjust.sdk.AdjustReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.adjust.sdk.ReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.amazon.device.iap.ResponseReceiver
actions: com.amazon.inapp.purchasing.NOTIFY
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
286
Uncompressed size
55540968
Highest datetime
2015-08-18 13:55:38
Lowest datetime
2015-06-27 07:34:10
Contained files by extension
png
211
xml
39
dll
12
so
6
dex
1
MF
1
RSA
1
txt
1
SF
1
Contained files by type
PNG
211
XML
39
unknown
17
Portable Executable
12
ELF
6
DEX
1
File identification
MD5 88b729201c7cbbe02b7e3451bb202698
SHA1 083bb26d7e8821ca2ede2f06294acd9184ad9684
SHA256 f865b07ef25a722a926fef29deeb52028fddfd14e55edb9c23524b191f734479
ssdeep
393216:b+Qp3ieMg+KA8TAOtwqqcIgzHlyFhiT3CngyPR7euao26jmgj7cz:b+QEuA8TpaFh6CtRqo2W4z

File size 18.9 MB ( 19801611 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-08-28 00:20:48 UTC ( 3 years, 9 months ago )
Last submission 2018-03-16 18:23:03 UTC ( 1 year, 2 months ago )
File names ff648c8157e9c9b7386cf58431ecf769cc16964981d7875914ef498c9f99a4bcfaabf209921bbfd93014613cd62ca63a94e5d3904e908de1a6ed76dbbed115a8
88b729201c7cbbe02b7e3451bb202698.tmp.28627
filename
star-wars-a-galactic-defense.apk
base.apk
88B729201C7CBBE02B7E3451BB202698
com.mobage.ww.a1903.SWTD_Android.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.mobage.ww.a1903.SWTD_Android-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.mobage.ww.a1903.SWTD_Android