× 쿠키가 비활성화 되어 있습니다! 이 사이트는 작업을 제대로 하려면 쿠키 활성화가 필요합니다.
SHA256: ce1b8fbfa95e69b65ca91918b65e6ee7e1c275c0cc5b4a10ab3d132dc6086c9d
파일 이름: base.apk
탐지 비율: 0 / 59
분석 날짜: 2019-01-09 09:56:32 UTC ( 4개월, 1주 전 ) 최신 보기
안티바이러스 결과 업데이트
Acronis 20181227
Ad-Aware 20190109
AegisLab 20190109
AhnLab-V3 20190108
Alibaba 20180921
ALYac 20190109
Antiy-AVL 20190108
Arcabit 20190109
Avast 20190109
Avast-Mobile 20190108
AVG 20190109
Avira (no cloud) 20190108
Babable 20180918
Baidu 20190108
BitDefender 20190109
Bkav 20190108
CAT-QuickHeal 20190108
ClamAV 20190109
CMC 20190108
Comodo 20190109
CrowdStrike Falcon (ML) 20181022
Cybereason 20190109
Cylance 20190109
Cyren 20190109
DrWeb 20190109
Emsisoft 20190109
Endgame 20181108
ESET-NOD32 20190109
F-Prot 20190109
F-Secure 20190109
Fortinet 20190109
GData 20190109
Ikarus 20190108
Sophos ML 20181128
Jiangmin 20190109
K7AntiVirus 20190109
K7GW 20190109
Kaspersky 20190109
Kingsoft 20190109
Malwarebytes 20190109
MAX 20190109
McAfee 20190109
McAfee-GW-Edition 20190109
Microsoft 20190109
eScan 20190109
NANO-Antivirus 20190109
Palo Alto Networks (Known Signatures) 20190109
Panda 20190108
Qihoo-360 20190109
Rising 20190109
SentinelOne (Static ML) 20181223
Sophos AV 20190109
SUPERAntiSpyware 20190102
Symantec 20190109
TACHYON 20190109
Tencent 20190109
TheHacker 20190106
Trapmine 20190103
TrendMicro 20190109
TrendMicro-HouseCall 20190109
Trustlook 20190109
VBA32 20190108
VIPRE 20190109
ViRobot 20190109
Webroot 20190109
Yandex 20181229
Zillya 20190108
ZoneAlarm by Check Point 20190109
Zoner 20190109
The file being studied is Android related! APK Android file more specifically. The application's main package name is at.nerbrothers.SuperJump. The internal version number of the application is 1072. The displayed version string of the application is 3.1.4. The minimum Android API level for the application to run (MinSDKVersion) is 16. The target Android API level for the application to run (TargetSDKVersion) is 27.
Required permissions
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
com.android.vending.BILLING (Unknown permission from android reference)
Activities
at.nerbrothers.SuperJump.LepSplash
at.nerbrothers.SuperJump.SuperJump
com.google.android.gms.ads.AdActivity
com.chartboost.sdk.CBImpressionActivity
com.ironsource.sdk.controller.ControllerActivity
com.ironsource.sdk.controller.InterstitialActivity
com.ironsource.sdk.controller.OpenUrlActivity
com.vungle.warren.ui.VungleActivity
com.vungle.warren.ui.VungleFlexViewActivity
com.vungle.warren.ui.VungleWebViewActivity
com.google.firebase.auth.internal.FederatedSignInActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.android.billingclient.api.ProxyBillingActivity
Services
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService
Receivers
at.nerbrothers.util.AlaramReceiver
com.vungle.warren.NetworkStateReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
Providers
com.google.firebase.provider.FirebaseInitProvider
com.google.android.gms.ads.MobileAdsInitProvider
Service-related intent filters
com.google.firebase.iid.FirebaseInstanceIdService
actions: com.google.firebase.INSTANCE_ID_EVENT
Activity-related intent filters
at.nerbrothers.SuperJump.LepSplash
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
Receiver-related intent filters
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
com.google.firebase.iid.FirebaseInstanceIdReceiver
actions: com.google.android.c2dm.intent.RECEIVE
com.vungle.warren.NetworkStateReceiver
actions: android.net.conn.CONNECTIVITY_CHANGE
categories: android.intent.category.DEFAULT
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
1656
Uncompressed size
13871914
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
766
tmx
187
fnt
6
xml
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
766
XML
214
unknown
20
File identification
MD5 f4cce30bb4a5cb144733c9ec807985b5
SHA1 5494ca0a21e90e843d7404684c629700636ec3b5
SHA256 ce1b8fbfa95e69b65ca91918b65e6ee7e1c275c0cc5b4a10ab3d132dc6086c9d
ssdeep
393216:nSEsjSjJeYIVcGIxrsE4LoxTvf9AQq7kOfQvAMomK/4KkbTntf1y9tbDNtlz:SzSj4Y4exYZUTvf93TOovBLP7KdNHz

File size 23.6 MB ( 24719949 bytes )
File type Android
Magic literal
Zip archive data

TrID Android Package (63.6%)
Java Archive (17.5%)
Sweet Home 3D design (generic) (12.7%)
ZIP compressed archive (4.8%)
PrintFox/Pagefox bitmap (var. P) (1.2%)
Tags
apk android

VirusTotal metadata
First submission 2019-01-09 09:56:32 UTC ( 4개월, 1주 전 )
Last submission 2019-01-26 08:44:51 UTC ( 3개월, 3주 전 )
파일 이름 lep-s-world.apk
base.apk
댓글이 없습니다.. 이 항목에 대해 댓글을 작성한 바이러스토탈 커뮤니티 회원이 아직 없습니다. 첫 번째로 댓글을 작성해 보십시오!

댓글 남기기...

?
댓글 달기

로그인 안됨. 등록된 사용자만 댓글을 남길 수 있습니다. 로그인하여 댓글을 남겨보십시오!

투표가 없습니다.. 아직 이 항목에 투표한 사람이 없습니다. 첫 번째로 투표해 보십시오!