× Куки вимкнені! Цей сайт потребує ввімкнення куків для правильної роботи
SHA256: 2187e53119503b5033e9b2b2f50df17818f09177ac1cd1e657b855fc26274b61
Назва файлу: ec4d2cf03b5085a33dae534239b3a542.apk
Співвідношення виявлення: 0 / 57
Дата дослідження: 2016-04-18 12:18:53 UTC ( 3 роки, 1 місяць тому ) Переглянути останні
Противірус Підсумок Оновлення
Ad-Aware 20160418
AegisLab 20160418
AhnLab-V3 20160418
Alibaba 20160418
ALYac 20160418
Antiy-AVL 20160418
Arcabit 20160418
Avast 20160418
AVG 20160418
Avira (no cloud) 20160418
AVware 20160418
Baidu 20160418
Baidu-International 20160418
BitDefender 20160418
Bkav 20160415
CAT-QuickHeal 20160418
ClamAV 20160418
CMC 20160415
Comodo 20160418
Cyren 20160418
DrWeb 20160418
Emsisoft 20160418
ESET-NOD32 20160418
F-Prot 20160418
F-Secure 20160418
Fortinet 20160418
GData 20160418
Ikarus 20160418
Jiangmin 20160418
K7AntiVirus 20160418
K7GW 20160418
Kaspersky 20160418
Kingsoft 20160418
Malwarebytes 20160418
McAfee 20160417
McAfee-GW-Edition 20160418
Microsoft 20160418
eScan 20160418
NANO-Antivirus 20160418
nProtect 20160415
Panda 20160417
Qihoo-360 20160418
Rising 20160418
Sophos AV 20160418
SUPERAntiSpyware 20160418
Symantec 20160418
Tencent 20160418
TheHacker 20160417
TotalDefense 20160418
TrendMicro 20160418
TrendMicro-HouseCall 20160418
VBA32 20160418
VIPRE 20160418
ViRobot 20160418
Yandex 20160416
Zillya 20160418
Zoner 20160418
The file being studied is Android related! APK Android file more specifically. The application's main package name is com.nexonm.loh.usios. The internal version number of the application is 1507. The displayed version string of the application is 1.5.07. The minimum Android API level for the application to run (MinSDKVersion) is 14. The target Android API level for the application to run (TargetSDKVersion) is 19.
Required permissions
com.nexonm.loh.usios.permission.C2D_MESSAGE (C2DM permission.)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
com.google.android.c2dm.permission.RECEIVE (Unknown permission from android reference)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.KILL_BACKGROUND_PROCESS (Unknown permission from android reference)
android.permission.RESTART_PACKAGES (kill background processes)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
com.android.vending.BILLING (Unknown permission from android reference)
android.permission.GET_ACCOUNTS (discover known accounts)
Activities
com.nexonm.loh.usios.AndroidAPI
com.nexonm.loh.usios.MyAlert
com.facebook.LoginActivity
com.prime31.FacebookProxyActivity
com.prime31.GoogleIABProxyActivity
com.google.example.games.pluginsupport.SignInHelperActivity
com.google.example.games.pluginsupport.SelectOpponentsHelperActivity
com.google.example.games.pluginsupport.InvitationInboxHelperActivity
Services
com.nexonm.loh.usios.GCMIntentService
Receivers
com.google.android.gcm.GCMBroadcastReceiver
io.fiverocks.android.InstallReferrerReceiver
Activity-related intent filters
com.nexonm.loh.usios.AndroidAPI
actions: android.intent.action.MAIN, android.intent.action.VIEW
categories: android.intent.category.LAUNCHER, android.intent.category.DEFAULT
Receiver-related intent filters
com.google.android.gcm.GCMBroadcastReceiver
actions: com.google.android.c2dm.intent.RECEIVE, com.google.android.c2dm.intent.REGISTRATION
categories: com.nexonm.loh.usios
io.fiverocks.android.InstallReferrerReceiver
actions: com.android.vending.INSTALL_REFERRER
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Interesting properties
The studied file contains at least one Portable Executable.
The file under inspection contains at least one ELF file.
Contained files
Compression metadata
Contained files
956
Uncompressed size
121550542
Highest datetime
2015-07-01 20:08:54
Lowest datetime
2015-03-05 02:44:46
Contained files by extension
png
210
xml
44
dll
17
so
6
dex
1
MF
1
RSA
1
mp4
1
SF
1
Contained files by type
unknown
677
PNG
210
XML
44
Portable Executable
17
ELF
6
DEX
1
MP3
1
File identification
MD5 ec4d2cf03b5085a33dae534239b3a542
SHA1 50ae9b770fe0f58ebc5a59175a944dbbe52532fe
SHA256 2187e53119503b5033e9b2b2f50df17818f09177ac1cd1e657b855fc26274b61
ssdeep
786432:+s/HvZVa6lLLwaR0Orb532XUYlAeHypMOnY0+ZqSejp+YitcICytg4xROHbf17Gt:7HvZjdNR0o53MpDSXY0+Zq9jp+zCytbF

Розмір файлу 41.2 Мб ( 43202785 bytes )
Тип файлу Android
Чарівні букви
Zip archive data, at least v2.0 to extract

TrID Java Archive (78.3%)
ZIP compressed archive (21.6%)
Tags
apk contains-pe android contains-elf

VirusTotal metadata
First submission 2015-07-03 19:15:28 UTC ( 3 роки, 10 місяців тому )
Last submission 2016-10-12 03:15:42 UTC ( 2 роки, 7 місяців тому )
Назви файлів legion-of-heroes.apk
ec4d2cf03b5085a33dae534239b3a542.apk
Advanced heuristic and reputation engines
Symantec reputation Suspicious.Insight
Немає дописів. Жоден член VirusTotal Спільноти ще не писав з цього приводу, Ви можете стати першим, хто зробить це!

Напишіть свій допис…

?
Залишити допис

Ви не ввійшли в систему. Лише зареєстровані користувачі можуть залишати дописи, увійдіть для отримання прав!

Немає голосів. Наразі ніхто не проголосував з цього приводу, Ви можете стати першим, хто зробить це!