× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: fc43c5348a9c300213442253ae61db60dfab247fb9ce2d2e53dbfa0da0d15dd1
File name: 95184317988c1adb4f0739b9002a9d97d7632fc0
Detection ratio: 0 / 60
Analysis date: 2018-01-01 20:19:18 UTC ( 1 year ago ) View latest
Antivirus Result Update
Ad-Aware 20171225
AegisLab 20180101
Alibaba 20171229
ALYac 20180101
Antiy-AVL 20180101
Arcabit 20180101
Avast 20180101
Avast-Mobile 20171231
AVG 20180101
Avira (no cloud) 20180101
AVware 20180101
Baidu 20171227
BitDefender 20180101
Bkav 20171229
CAT-QuickHeal 20180101
ClamAV 20180101
CMC 20180101
Comodo 20180101
CrowdStrike Falcon (ML) 20171016
Cybereason 20171103
Cylance 20180101
Cyren 20180101
DrWeb 20180101
eGambit 20180101
Emsisoft 20180101
Endgame 20171130
ESET-NOD32 20180101
F-Prot 20180101
F-Secure 20180101
Fortinet 20180101
GData 20180101
Sophos ML 20170914
Jiangmin 20180101
K7AntiVirus 20180101
K7GW 20180101
Kaspersky 20180101
Kingsoft 20180101
Malwarebytes 20180101
MAX 20180101
McAfee 20180101
McAfee-GW-Edition 20180101
Microsoft 20180101
eScan 20180101
NANO-Antivirus 20180101
nProtect 20171231
Palo Alto Networks (Known Signatures) 20180101
Panda 20180101
Qihoo-360 20180101
Rising 20171230
SentinelOne (Static ML) 20171224
Sophos AV 20180101
SUPERAntiSpyware 20180101
Symantec 20180101
Tencent 20180101
TheHacker 20171229
TotalDefense 20180101
TrendMicro 20180101
TrendMicro-HouseCall 20180101
Trustlook 20180101
VBA32 20171229
VIPRE 20180101
ViRobot 20180101
Webroot 20180101
WhiteArmor 20171226
Yandex 20171229
Zillya 20171231
ZoneAlarm by Check Point 20180101
Zoner 20180101
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.genius.taizairussia. The internal version number of the application is 2. The displayed version string of the application is 1.0.0. The minimum Android API level for the application to run (MinSDKVersion) is 15. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
com.genius.taizairussia.permission.C2D_MESSAGE (C2DM permission.)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.facebook.ads.AudienceNetworkActivity
com.genius.greekkaigai.AppActivity
com.tapjoy.TJAdUnitActivity
com.tapjoy.mraid.view.ActionHandler
com.tapjoy.mraid.view.Browser
com.tapjoy.TJContentActivity
com.facebook.FacebookActivity
com.facebook.CustomTabMainActivity
com.fyber.ads.ofw.OfferWallActivity
com.fyber.ads.videos.RewardedVideoActivity
com.fyber.ads.interstitials.InterstitialActivity
com.chartboost.sdk.CBImpressionActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.google.android.gms.ads.AdActivity
com.applovin.adview.AppLovinInterstitialActivity
com.applovin.adview.AppLovinConfirmationActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
com.google.android.gms.common.api.GoogleApiActivity
com.facebook.ads.InterstitialAdActivity
com.inmobi.rendering.InMobiAdActivity
com.unity3d.ads.adunit.AdUnitActivity
com.unity3d.ads.adunit.AdUnitSoftwareActivity
com.vungle.publisher.VideoFullScreenAdActivity
com.vungle.publisher.MraidFullScreenAdActivity
Services
com.google.firebase.messaging.FirebaseMessagingService
com.fyber.cache.CacheVideoDownloadService
com.google.android.gms.measurement.AppMeasurementService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
com.tapjoy.GCMReceiver
com.tapjoy.TapjoyReceiver
com.tapjoy.InstallReferrerReceiver
com.genius.greekkaigai.LocalNotificationReceiver
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.firebase.iid.FirebaseInstanceIdInternalReceiver
Providers
com.facebook.internal.FacebookInitProvider
com.google.firebase.provider.FirebaseInitProvider
Service-related intent filters
com.google.firebase.messaging.FirebaseMessagingService
actions: com.google.firebase.MESSAGING_EVENT
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
com.genius.greekkaigai.AppActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.inmobi.commons.core.utilities.uid.ImIdShareBroadCastReceiver
actions: com.inmobi.share.id
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.genius.taizairussia
com.tapjoy.GCMReceiver
actions: com.google.android.c2dm.intent.REGISTRATION, com.google.android.c2dm.intent.RECEIVE, com.google.android.gcm.intent.RETRY
categories: com.tapjoy.sample.cocos2dx3
com.tapjoy.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
1318
Uncompressed size
72629064
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
765
jpg
111
xml
56
mp3
9
dex
2
db
2
so
2
m4a
2
MF
1
js
1
SF
1
ttf
1
DSA
1
Contained files by type
PNG
765
JPG
111
XML
56
unknown
55
MP3
9
DEX
2
ELF
2
File identification
MD5 7de3eefaf1481fae9f67aa0092e4837d
SHA1 95184317988c1adb4f0739b9002a9d97d7632fc0
SHA256 fc43c5348a9c300213442253ae61db60dfab247fb9ce2d2e53dbfa0da0d15dd1
ssdeep
1572864:yQpUXQn+KFOOHfMiTV2hx7WKOnYIhG8m7ARl12hhDt4FhGHix:yQpGQn+COOHfDV2/po5fr26Fhvx

File size 58.1 MB ( 60911845 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (61.4%)
Java Archive (16.9%)
BlueEyes Animation (15.7%)
ZIP compressed archive (4.6%)
PrintFox/Pagefox bitmap (var. P) (1.1%)
Tags
apk android contains-elf

VirusTotal metadata
First submission 2018-01-01 20:19:18 UTC ( 1 year ago )
Last submission 2018-08-22 21:17:50 UTC ( 4 months, 3 weeks ago )
File names my-devil-lovers-_mod.apk
95184317988c1adb4f0739b9002a9d97d7632fc0
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!