0/62
Threat
Analyzed on 2021-11-14T10:24:09.113176
MD5 | 5c9b65289d56419fd4f0bac1c52f5f40 | |
SHA1 | 75a80bbe1c8237e22d6520fbc46a2f4b36b86528 | |
SHA256 | 03998dc30edf6de136e14a6978257ceb1105eb5288642d80f14e4dc84f3bbc91 | |
Size | 0.69MB |
Information computed with APKiD.
/tmp/tmpqosxys4v!classes.dex | |
manipulator |
|
compiler |
|
Information computed with ssdeep.
APK file | 12288:HuH9zKhnet3YcW6e3+NSpycDEjO5fVPNbGPQcfb/7DwGWGisMRGjsx:8hset3Y7TmSIvi5ZwPb3risM+sx | |
Manifest | 384:HnPgSHKPVhWcLMso3AbCaFT/h8iwEX0yUah3LbA1cZzsgcKTcGPbexxpOFglIKzk:… | |
classes.dex | 12288:gHlo8wcVgtqdbUng+dId7LosvImKb+5EhPcHigfOIWfxKolfUn+jRIPie4Mo0y2… |
Information computed with Dexofuzzy.
APK file | 1536:C4JAelUuQ5BCtPzaYYyKzEbxggpL1P5q6TGh:OeKumMRz1YKpL1Uh | |
classes.dex | 1536:C4JAelUuQ5BCtPzaYYyKzEbxggpL1P5q6TGh:OeKumMRz1YKpL1Uh |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Findings | Files |
---|---|
Certificate/Key files hardcoded inside the app. |
SEC-INF/buildConfirm.crt |
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Activity (com.sec.android.app.camaftest.CaptureActivity) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Activity (com.sec.android.app.camerafirmware.CameraFirmware_user) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
Low | Broadcast Receiver (com.sec.android.app.camerafirmware.CameraFirmwareBroadCastReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.sec.factory.permission.KEYSTRINGprotectionLevel: signatureOrSystem [android:exported=true] A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device. |
Low | Broadcast Receiver (com.sec.android.app.camera.receiver.CameraBroadCastReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.sec.factory.permission.KEYSTRINGprotectionLevel: signatureOrSystem [android:exported=true] A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device. |
High | Broadcast Receiver (com.sec.android.app.camera.receiver.AtBroadcastReceiver) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.sec.android.app.camera.CameraApertureTest) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Activity (com.sec.android.app.camera.CameraTestActivity) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Dailer Code: 34971539 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: 7412365 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: \ 349715390 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: 136889 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
Medium | High Intent Priority (99999999)[android:priority] By setting an intent priority higher than another intent, the app effectively overrides other requests. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
Certificate valid not before | June 22, 2011, 12:25 p.m. |
First submission on VT | April 27, 2021, 4:08 a.m. |
Last submission on VT | April 27, 2021, 4:08 a.m. |
Upload on Pithus | Nov. 14, 2021, 10:24 a.m. |
Certificate valid not after | Nov. 7, 2038, 12:25 p.m. |
Score | 0/62 |
Report | https://www.virustotal.com/gui/file/03998dc30edf6de136e14a6978257ceb1105eb5288642d80f14e4dc84f3bbc91/detection |
Information computed with MobSF.
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['NFC', 'network connectivity', 'camera', 'bluetooth', 'microphone']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to ['system logs', 'address book']. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
www.google | ||||
US | zxing.appspot.com | 216.58.212.148 | ||
US | code.google.com | 142.250.186.78 |
Information computed with MobSF.
http://www.google http://zxing.appspot.com/scan Defined in com/sec/android/app/camaftest/CaptureActivity.java |
|
http://www.google http://zxing.appspot.com/scan Defined in com/sec/android/app/camaftest/CaptureActivity.java |
|
http://code.google.com/p/zxing Defined in Android String Resource |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Modify voice volume |
Confidence:
|
Method reflection |
Confidence:
|
Connect to a URL and read data from it |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Open a file from given absolute path of the file |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Method reflection |
Confidence:
|
Connect to the remote server through the given URL |
Confidence:
|
Query data from URI (SMS, CALLLOGS) |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Get calendar information |
Confidence:
|
Executes the specified string Linux command |
Information computed with MobSF.
Information computed by Pithus.