× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 6b3aedb909d4d12bb4073fec15af5e2d1a1fca2a67775dce4de2d77826eac608
File name: SuperMarioRun.apk
Detection ratio: 12 / 55
Analysis date: 2017-01-03 00:29:34 UTC ( 1 month, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Android.Trojan.HiddenApp.gJOKA 20170103
AhnLab-V3 Android-Trojan/Marcher.f767 20170102
Arcabit Android.Trojan.HiddenApp.gJOKA 20170103
BitDefender Android.Trojan.HiddenApp.gJOKA 20170103
Bkav Android.Malware.CertV1.CD9C 20161229
DrWeb Android.BankBot.140.origin 20170102
ESET-NOD32 a variant of Android/Spy.Banker.HG 20170102
Emsisoft Android.Trojan.HiddenApp.gJOKA (B) 20170102
F-Secure Android.Trojan.HiddenApp.gJOKA 20170102
GData Android.Trojan.HiddenApp.gJOKA 20170102
Ikarus Trojan-Banker.AndroidOS.Marcher 20170102
Sophos Andr/Banker-GPH 20170102
ALYac 20170103
AVG 20170102
AVware 20170103
AegisLab 20161231
Alibaba 20161223
Antiy-AVL 20170103
Avast 20170103
Avira (no cloud) 20170102
Baidu 20161207
CAT-QuickHeal 20170102
CMC 20170102
ClamAV 20170102
Comodo 20170102
CrowdStrike Falcon (ML) 20161024
Cyren 20170102
F-Prot 20170102
Fortinet 20170102
Invincea 20161216
Jiangmin 20170102
K7AntiVirus 20170102
K7GW 20170102
Kaspersky 20170102
Kingsoft 20170103
Malwarebytes 20170103
McAfee 20170103
McAfee-GW-Edition 20170103
eScan 20170103
Microsoft 20170103
NANO-Antivirus 20170102
Panda 20170102
Qihoo-360 20170103
Rising 20170102
SUPERAntiSpyware 20170102
Symantec 20170103
Tencent 20170103
TheHacker 20170102
Trustlook 20170103
VBA32 20161229
VIPRE 20170103
ViRobot 20170102
WhiteArmor 20161221
Yandex 20170103
Zillya 20170102
Zoner 20170102
nProtect 20170102
The file being studied is Android related! APK Android file more specifically. The application's main package name is uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd. The internal version number of the application is 1. The displayed version string of the application is 1.0. The minimum Android API level for the application to run (MinSDKVersion) is 9. The target Android API level for the application to run (TargetSDKVersion) is 18.
Required permissions
android.permission.CHANGE_NETWORK_STATE (change network connectivity)
android.permission.SEND_SMS (send SMS messages)
android.permission.USES_POLICY_FORCE_LOCK (Unknown permission from android reference)
android.permission.RECEIVE_BOOT_COMPLETED (automatically start at boot)
android.permission.READ_PHONE_STATE (read phone state and identity)
android.permission.VIBRATE (control vibrator)
android.permission.WRITE_SMS (edit SMS or MMS)
android.permission.ACCESS_WIFI_STATE (view Wi-Fi status)
android.permission.RECEIVE_SMS (receive SMS)
android.permission.WAKE_LOCK (prevent phone from sleeping)
android.permission.GET_TASKS (retrieve running applications)
android.permission.CALL_PHONE (directly call phone numbers)
android.permission.WRITE_SETTINGS (modify global system settings)
android.permission.ACCESS_NETWORK_STATE (view network status)
android.permission.INTERNET (full Internet access)
android.permission.CHANGE_WIFI_STATE (change Wi-Fi status)
android.permission.READ_CONTACTS (read contact data)
android.permission.READ_SMS (read SMS or MMS)
Activities
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p027c
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p019a
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p081m
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p054m
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p024t
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p015i
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p015j
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p065g
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p089d
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p034h
Services
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p050b
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078p
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p074f
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p080g
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.C062i.p047p
Receivers
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p025w
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p059f
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p015t
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078d
Service-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p050b
actions: com.android.ussd.IExtendedNetworkService
Activity-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p027c
actions: android.intent.action.MAIN
categories: android.intent.category.DEFAULT, android.intent.category.LAUNCHER
Receiver-related intent filters
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p025w
actions: android.intent.action.BOOT_COMPLETED, android.intent.action.QUICKBOOT_POWERON
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p059f
actions: android.provider.Telephony.SMS_RECEIVED
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p078d
actions: p027c.AlarmAction
uiq.pizfbwzbvxmtkmtbhnijdsrhdixqwd.p015t
actions: android.app.action.DEVICE_ADMIN_ENABLED
Application certificate information
Interesting strings
The file being studied is a compressed stream! Details about the compressed contents follow.
Contained files
Compression metadata
Contained files
310
Uncompressed size
1168372
Highest datetime
1980-00-00 00:00:00
Lowest datetime
1980-00-00 00:00:00
Contained files by extension
png
204
xml
101
dex
1
MF
1
RSA
1
SF
1
Contained files by type
PNG
204
XML
101
unknown
4
DEX
1
File identification
MD5 d332560f1fc3e6dc58d94d6fa0dab748
SHA1 5b5da8f6fd696d540106ed90ef95acea4c8b4dc9
SHA256 6b3aedb909d4d12bb4073fec15af5e2d1a1fca2a67775dce4de2d77826eac608
ssdeep
12288:MuXAtH9buEMr1zRdUJHWD7XUaBIvjt841dyY79PT0mW:Meolmby2D7UaBIvjH1dyY79PT0mW

File size 685.6 KB ( 702099 bytes )
File type Android
Magic literal
Zip archive data, at least v2.0 to extract

TrID Android Package (73.9%)
Java Archive (20.4%)
ZIP compressed archive (5.6%)
Tags
apk android

VirusTotal metadata
First submission 2017-01-03 00:29:34 UTC ( 1 month, 1 week ago )
Last submission 2017-01-16 04:52:12 UTC ( 3 weeks, 4 days ago )
File names d332560f1fc3e6dc58d94d6fa0dab748.apk
SuperMarioRun.apk
xxx.apk
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!