× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: ff3bc417a3f22b9cbafc8fd26259e77472c515a66bad9dd1bd229038210453c8
File name: com.gumdropgames.surfboardrun.apk
Detection ratio: 0 / 57
Analysis date: 2016-12-26 01:14:36 UTC ( 2 years, 1 month ago ) View latest
Antivirus Result Update
Ad-Aware 20161226
AegisLab 20161225
AhnLab-V3 20161225
Alibaba 20161223
ALYac 20161226
Antiy-AVL 20161226
Arcabit 20161226
Avast 20161226
AVG 20161226
Avira (no cloud) 20161225
AVware 20161226
Baidu 20161207
BitDefender 20161226
Bkav 20161224
CAT-QuickHeal 20161224
ClamAV 20161225
CMC 20161225
Comodo 20161225
CrowdStrike Falcon (ML) 20161024
Cyren 20161226
DrWeb 20161226
Emsisoft 20161226
ESET-NOD32 20161225
F-Prot 20161226
F-Secure 20161226
Fortinet 20161225
GData 20161226
Sophos ML 20161216
Jiangmin 20161225
K7AntiVirus 20161225
K7GW 20161226
Kaspersky 20161226
Kingsoft 20161226
Malwarebytes 20161225
McAfee 20161226
McAfee-GW-Edition 20161226
Microsoft 20161225
eScan 20161226
NANO-Antivirus 20161226
nProtect 20161226
Panda 20161225
Qihoo-360 20161226
Rising 20161226
Sophos AV 20161225
SUPERAntiSpyware 20161225
Symantec 20161226
Tencent 20161226
TheHacker 20161222
TotalDefense 20161225
TrendMicro 20161226
TrendMicro-HouseCall 20161226
Trustlook 20161226
VBA32 20161223
VIPRE 20161226
ViRobot 20161225
WhiteArmor 20161221
Yandex 20161225
Zillya 20161223
Zoner 20161225
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.gumdropgames.surfboardrun. The internal version number of the application is 5. The displayed version string of the application is 1.0.4. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 22.
Required permissions
android.permission.VIBRATE (control vibrator)
android.permission.INTERNET (full Internet access)
android.permission.USE_CREDENTIALS (use the authentication credentials of an account)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_NETWORK_STATE (view network status)
com.gumdropgames.surfboardrun.permission.C2D_MESSAGE (C2DM permission.)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.READ_PROFILE (read the user's personal profile data)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.gumdropgames.surfboardrun.UnityPlayerNativeActivity
com.facebook.unity.FBUnityLoginActivity
com.facebook.unity.FBUnityDialogsActivity
com.facebook.LoginActivity
com.facebook.unity.FBUnityDeepLinkingActivity
com.millennialmedia.android.MMActivity
com.millennialmedia.android.VideoPlayer
com.inmobi.androidsdk.IMBrowserActivity
com.adsdk.sdk.banner.InAppWebView
com.adsdk.sdk.mraid.MraidActivity
com.adsdk.sdk.video.RichMediaActivity
com.adfonic.android.AdfonicActivity
com.jirbo.adcolony.AdColonyOverlay
com.jirbo.adcolony.AdColonyFullscreen
com.jirbo.adcolony.AdColonyBrowser
com.unity3d.ads.android.view.UnityAdsFullscreenActivity
com.google.android.gms.ads.AdActivity
com.google.android.gms.ads.purchase.InAppPurchaseActivity
Services
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.CampaignTrackingService
com.gumdropgames.com.gumdropgames.surfboardrun.GCMIntentService
Receivers
com.google.android.gms.analytics.AnalyticsReceiver
com.google.android.gms.analytics.CampaignTrackingReceiver
com.gumdropgames.activities.AlarmReceiver
com.google.android.gcm.GCMBroadcastReceiver
Activity-related intent filters
com.gumdropgames.surfboardrun.UnityPlayerNativeActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.gumdropgames.surfboardrun
com.google.android.gms.analytics.AnalyticsReceiver
actions: com.google.android.gms.analytics.ANALYTICS_DISPATCH
com.google.android.gms.analytics.CampaignTrackingReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
967
Uncompressed size
101042026
Highest datetime
2016-12-19 11:56:16
Lowest datetime
2016-11-03 11:30:42
Contained files by extension
png
480
xml
152
dll
13
so
3
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
480
unknown
318
XML
152
Portable Executable
13
ELF
3
DEX
1
File identification
MD5 9b1acc3b01d214e779666c9df3bb19ae
SHA1 2857529d3670084c5c262bd98f2dd6c49d75cf19
SHA256 ff3bc417a3f22b9cbafc8fd26259e77472c515a66bad9dd1bd229038210453c8
ssdeep
786432:3UaL3WnEMRpQyPIILCbSr6B0PdodFmyWhS1EQ+LGDYwEp:k4GEMRoTS2B2sFmjLQ+qw

File size 27.5 MB ( 28839054 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Java Archive (74.3%)
ZIP compressed archive (20.5%)
PrintFox/Pagefox bitmap (var. P) (5.1%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2016-12-26 01:14:36 UTC ( 2 years, 1 month ago )
Last submission 2016-12-26 01:14:36 UTC ( 2 years, 1 month ago )
File names com.gumdropgames.surfboardrun.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!