× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: feaba152a31bd3b18f8b6d3c00b82fa17811597f59617529590ce3c41b1a24fe
File name: d238a5f90460bcd9dbc3f469f5c85f1b
Detection ratio: 0 / 60
Analysis date: 2017-04-07 02:15:39 UTC ( 1 year, 10 months ago ) View latest
Antivirus Result Update
Ad-Aware 20170406
AegisLab 20170406
AhnLab-V3 20170406
Alibaba 20170406
ALYac 20170406
Antiy-AVL 20170407
Arcabit 20170406
Avast 20170407
AVG 20170406
Avira (no cloud) 20170407
AVware 20170407
Baidu 20170406
BitDefender 20170407
Bkav 20170405
CAT-QuickHeal 20170406
ClamAV 20170406
CMC 20170406
Comodo 20170407
CrowdStrike Falcon (ML) 20170130
Cyren 20170406
DrWeb 20170406
Emsisoft 20170407
Endgame 20170407
ESET-NOD32 20170407
F-Prot 20170406
F-Secure 20170407
Fortinet 20170407
GData 20170406
Ikarus 20170406
Sophos ML 20170203
Jiangmin 20170406
K7AntiVirus 20170406
K7GW 20170406
Kaspersky 20170406
Kingsoft 20170407
Malwarebytes 20170406
McAfee 20170406
McAfee-GW-Edition 20170406
Microsoft 20170407
eScan 20170406
NANO-Antivirus 20170407
nProtect 20170406
Palo Alto Networks (Known Signatures) 20170407
Panda 20170406
Qihoo-360 20170407
Rising 20170407
SentinelOne (Static ML) 20170330
Sophos AV 20170406
SUPERAntiSpyware 20170407
Symantec 20170406
Symantec Mobile Insight 20170406
Tencent 20170407
TheHacker 20170406
TotalDefense 20170406
TrendMicro-HouseCall 20170406
Trustlook 20170407
VBA32 20170406
VIPRE 20170406
ViRobot 20170406
Webroot 20170407
WhiteArmor 20170327
Yandex 20170406
Zillya 20170406
ZoneAlarm by Check Point 20170406
Zoner 20170407
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.igg.android.lordsmobile. The internal version number of the application is 92. The displayed version string of the application is 1.41. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 24.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.igg.android.lordsmobile.permission.C2D_MESSAGE (C2DM permission.)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.INTERNET (full Internet access)
com.android.vending.CHECK_LICENSE (Unknown permission from android reference)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
com.igg.iggsdkbusiness.IGGSDKPlugin
com.unity3d.player.VideoPlayer
com.outlinegames.unibill.PurchaseActivity
com.igg.iggsdkbusiness.IGGWebView
com.igg.iggsdkbusiness.TapjoyView
com.prime31.ReauthorizationProxy
com.facebook.FacebookActivity
com.igg.android.wegamers.auth.AuthActivity
com.google.games.bridge.NativeBridgeActivity
com.unity3d.plugin.downloader.UnityDownloaderActivity
Services
com.igg.iggsdkbusiness.GCMIntentService
com.unity3d.plugin.downloader.UnityDownloaderService
Receivers
com.igg.iggsdkbusiness.GCMBroadcastReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.igg.iggsdkbusiness.LocalNotificationReceiver
com.igg.iggsdkbusiness.AuthRequestReceiver
com.unity3d.plugin.downloader.UnityAlarmReceiver
Activity-related intent filters
com.igg.android.wegamers.auth.AuthActivity
actions: android.intent.action.VIEW
categories: android.intent.category.DEFAULT, android.intent.category.BROWSABLE
com.igg.iggsdkbusiness.IGGSDKPlugin
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT, android.intent.category.BROWSABLE
Receiver-related intent filters
com.appsflyer.MultipleInstallBroadcastReceiver
actions: com.android.vending.INSTALL_REFERRER
com.igg.iggsdkbusiness.AuthRequestReceiver
actions: com.igg.android.game.authreceiver
com.igg.iggsdkbusiness.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.igg.android.lordsmobile
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
477
Uncompressed size
33639397
Highest datetime
2017-04-05 17:38:22
Lowest datetime
2015-08-28 10:44:10
Contained files by extension
png
319
xml
137
dll
7
so
5
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
319
XML
137
unknown
9
Portable Executable
6
ELF
5
DEX
1
File identification
MD5 d238a5f90460bcd9dbc3f469f5c85f1b
SHA1 d1dbd83af464672e054db2c5bdd8a3a3bd776abc
SHA256 feaba152a31bd3b18f8b6d3c00b82fa17811597f59617529590ce3c41b1a24fe
ssdeep
393216:5sHgeDtxnR4d8yt4Av1o5jHYvDxgu0rOIjxVD2c7CAuuPlG2v0LLx+:gpxSttP1ol9aNc7bPlfvUx+

File size 15.3 MB ( 16082397 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2017-04-07 00:34:00 UTC ( 1 year, 10 months ago )
Last submission 2017-10-02 02:45:10 UTC ( 1 year, 4 months ago )
File names lords-mobile.apk
base.apk
lords-mobile-1.41.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Opened files
/mnt/sdcard
APP_ASSETS/bin/Data/settings.xml
Accessed files
/data/app/com.igg.android.lordsmobile-1.apk/assets/bin/Data/settings.xml
/mnt/sdcard/Android/obb/com.igg.android.lordsmobile