× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fb54a87a19b7107b3fd394150304afee4d5fda205b29bbc46e03ce9782060f94
File name: dd13e28b0310dff906c8668f77c44437
Detection ratio: 0 / 61
Analysis date: 2017-04-12 23:19:54 UTC ( 1 year, 11 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170413
AegisLab 20170412
AhnLab-V3 20170412
Alibaba 20170412
ALYac 20170413
Antiy-AVL 20170412
Arcabit 20170412
Avast 20170412
AVG 20170412
Avira (no cloud) 20170412
AVware 20170410
Baidu 20170411
BitDefender 20170412
Bkav 20170412
CAT-QuickHeal 20170412
ClamAV 20170412
CMC 20170412
Comodo 20170412
CrowdStrike Falcon (ML) 20170130
Cyren 20170412
DrWeb 20170412
Emsisoft 20170412
Endgame 20170411
ESET-NOD32 20170412
F-Prot 20170412
F-Secure 20170412
Fortinet 20170412
GData 20170412
Ikarus 20170412
Sophos ML 20170203
Jiangmin 20170412
K7AntiVirus 20170412
K7GW 20170412
Kaspersky 20170412
Kingsoft 20170413
Malwarebytes 20170412
McAfee 20170412
McAfee-GW-Edition 20170412
Microsoft 20170412
eScan 20170412
NANO-Antivirus 20170412
nProtect 20170412
Palo Alto Networks (Known Signatures) 20170413
Panda 20170412
Qihoo-360 20170413
Rising 20170412
SentinelOne (Static ML) 20170330
Sophos AV 20170413
SUPERAntiSpyware 20170413
Symantec 20170412
Symantec Mobile Insight 20170412
Tencent 20170413
TheHacker 20170412
TotalDefense 20170410
TrendMicro 20170412
TrendMicro-HouseCall 20170412
Trustlook 20170413
VBA32 20170412
VIPRE 20170412
ViRobot 20170412
Webroot 20170413
WhiteArmor 20170409
Yandex 20170411
Zillya 20170411
ZoneAlarm by Check Point 20170412
Zoner 20170412
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.IvanAF.ClimbAMIYPfree. The internal version number of the application is 3001000. The displayed version string of the application is 3.1.0. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 16.
Required permissions
android.permission.BLUETOOTH (create Bluetooth connections)
android.permission.INTERNET (full Internet access)
Activities
com.IvanAF.ClimbAMIYPfree.RunnerActivity
com.IvanAF.ClimbAMIYPfree.RunnerPreferenceActivity
com.google.android.gms.ads.AdActivity
Activity-related intent filters
com.IvanAF.ClimbAMIYPfree.RunnerActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
182
Uncompressed size
58353948
Highest datetime
2017-04-06 21:03:36
Lowest datetime
2017-03-08 01:26:44
Contained files by extension
png
139
xml
14
ogg
9
so
8
ext
2
ini
2
dex
1
MF
1
RSA
1
lnk
1
SF
1
Contained files by type
PNG
139
XML
14
unknown
11
OGG
9
ELF
8
DEX
1
File identification
MD5 dd13e28b0310dff906c8668f77c44437
SHA1 b6fabcd1070a320a7b2be7f6ee9386d37542f544
SHA256 fb54a87a19b7107b3fd394150304afee4d5fda205b29bbc46e03ce9782060f94
ssdeep
786432:dxIeeBivCN89tsjBYPO9GGeL0KZ5HUfbt:QeeBp8sGPO9L40KzHkx

File size 28.4 MB ( 29812405 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk android dyn-calls contains-elf

VirusTotal metadata
First submission 2017-04-12 23:19:54 UTC ( 1 year, 11 months ago )
Last submission 2018-05-31 00:59:48 UTC ( 9 months, 3 weeks ago )
File names climb-amiyp-free.apk
1499446465-dd13e28b0310dff906c8668f77c44437.apk
com.IvanAF.ClimbAMIYPfree-3001000.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Permissions checked
android.permission.INTERNET:com.IvanAF.ClimbAMIYPfree
Started receivers
android.intent.action.USER_PRESENT
android.intent.action.SCREEN_OFF
Opened files
/data/app/com.IvanAF.ClimbAMIYPfree-1.apk
/data/data/com.IvanAF.ClimbAMIYPfree/code_cache/secondary-dexes
APP_ASSETS/game.droid
APP_ASSETS/splash.png
/data/data/com.IvanAF.ClimbAMIYPfree/code_cache
/data/data/com.IvanAF.ClimbAMIYPfree/files
/data/data/com.IvanAF.ClimbAMIYPfree/cache
/data/data/com.IvanAF.ClimbAMIYPfree/files/secondary-dexes
Accessed files
/data/data/com.IvanAF.ClimbAMIYPfree/files
Dynamically called methods
android.content.SharedPreferences$Editor.apply
Accessed URIs
http://plus.google.com/
market://details