0/64

Threat

com.best_la.caller.screen.themes_3d

Caller Screen Theme

Analyzed on 2021-12-30T19:52:18.465619

12

permissions

7

activities

0

services

1

receivers

2

domains

File sums

MD5 305c17e62fb67bf20aa004b8ee0882d6
SHA1 294c96614dca90c7e02bcf420714abd8190e270e
SHA256 0d43c552f874201d5f881de1c4986ea10cd3efac81a73e76fb8fc95aced10a53
Size 17.6MB

APKiD

Information computed with APKiD.

/tmp/tmpro_0k56t!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.DEVICE check
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 393216:xeBc07JKS8E4UXxX3DUMkfxWgXCrG+MKnF24cdDIl5PX2ZN1L:qP70STBDUMkfxzCbMG24Xl5PmZNF
Manifest 192:zmCN3rHgSc49yik+3kQiz+jFovItjGdT+VrcT+C0T+7T+5nfCmQGGpR:6g3rHgSx9…
classes.dex 49152:jHKZphfkI+K62HnVJxMGfTMVrumurM6dnPSuIrutkT00iUgM:j2hfaK621JC1Vr…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 3072:zPPcoaAanFoItzRreF6WxZgONDuOFO33Jz:X4oIjU64ZgONDFFcJz
classes.dex 3072:zPPcoaAanFoItzRreF6WxZgONDuOFO33Jz:X4oIjU64ZgONDFFcJz

APK details

Information computed with AndroGuard and Pithus.

Package com.best_la.caller.screen.themes_3d
App name Caller Screen Theme
Version name 1.7
Version code 7
SDK 9 - 26
UAID d8c272364eae96190d5eaeee0a95c6e7b0931d9e
Signature Signature V1 Signature V2 Signature V3
Frosting Frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x2146444e: Google metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 698f2abc8616978060f00079e5ca8b11
SHA1 5bda55c146db2d13df8e4c17d0fc0ca70e5b52a2
SHA256 cc9e6e998b95e6e3bb8e89cc316218b229f97cf346a2808051f071e8ee5aa76f
Issuer Common Name: Android, Organizational Unit: Android, Organization: Google Inc., Locality: Mountain View, State/Province: California, Country: US
Not before 2019-06-01T07:48:16+00:00
Not after 2049-06-01T07:48:16+00:00

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Broadcast Receiver (com.best_la.caller.screen.themes_3d.Reciver.CallReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.

Main Activity

Information computed with AndroGuard.

com.best_la.caller.screen.themes_3d.SplashActivity_new

Activities

Information computed with AndroGuard.

com.best_la.caller.screen.themes_3d.MainActivity
com.best_la.caller.screen.themes_3d.MyCustomDialog
com.best_la.caller.screen.themes_3d.CallScreen.CallerScreen
com.best_la.caller.screen.themes_3d.ThemeScreen.CallerTheme
com.best_la.caller.screen.themes_3d.SplashActivity_new
com.karumi.dexter.DexterActivity
com.google.android.gms.ads.AdActivity

Receivers

Information computed with AndroGuard.

com.best_la.caller.screen.themes_3d.Reciver.CallReceiver

Sample timeline

Oldest file found in APK June 1, 2019, 12:50 a.m.
Certificate valid not before June 1, 2019, 7:48 a.m.
Latest file found in APK June 1, 2019, 8:24 a.m.
First submission on VT June 16, 2020, 1:48 a.m.
Last submission on VT June 16, 2020, 1:48 a.m.
Upload on Pithus Dec. 30, 2021, 7:52 p.m.
Certificate valid not after June 1, 2049, 7:48 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption not in accordance with FCS_COP.1.1(1), AES-ECB mode is being used.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/best_la/caller/screen/themes_3d/MainActivity.java
com/best_la/caller/screen/themes_3d/MyCustomDialog.java
com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
com/wang/avi/AVLoadingIndicatorView.java
Pygal United States: 200

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US themojtools.home.blog 192.0.78.31
US play.google.com 142.250.186.110

URL analysis

Information computed with MobSF.

https://play.google.com/store/apps/details?id=
http://play.google.com/store/apps/details?id=
https://play.google.com/store/apps/developer?id=Dev+Studio+developer
https://themojtools.home.blog/2019/04/30/the-moj-tools/
Defined in com/best_la/caller/screen/themes_3d/MainActivity.java
https://play.google.com/store/apps/details?id=
http://play.google.com/store/apps/details?id=
https://play.google.com/store/apps/developer?id=Dev+Studio+developer
https://themojtools.home.blog/2019/04/30/the-moj-tools/
Defined in com/best_la/caller/screen/themes_3d/MainActivity.java
https://play.google.com/store/apps/details?id=
http://play.google.com/store/apps/details?id=
https://play.google.com/store/apps/developer?id=Dev+Studio+developer
https://themojtools.home.blog/2019/04/30/the-moj-tools/
Defined in com/best_la/caller/screen/themes_3d/MainActivity.java
https://play.google.com/store/apps/details?id=
http://play.google.com/store/apps/details?id=
https://play.google.com/store/apps/developer?id=Dev+Studio+developer
https://themojtools.home.blog/2019/04/30/the-moj-tools/
Defined in com/best_la/caller/screen/themes_3d/MainActivity.java

Permissions analysis

Information computed with MobSF.

High android.permission.ANSWER_PHONE_CALLS Allows the app to answer an incoming phone call.
High android.permission.READ_EXTERNAL_STORAGE read external storage contents
Allows an application to read from external storage.
High android.permission.READ_CONTACTS read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.CHANGE_NETWORK_STATE change network connectivity
Allows applications to change network connectivity state.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.DISABLE_KEYGUARD Allows applications to disable the keyguard if it is not secure.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.

Tracking analysis

Information computed with Exodus-core.

Google AdMob https://reports.exodus-privacy.eu.org/fr/trackers/312
Google Firebase Analytics https://reports.exodus-privacy.eu.org/fr/trackers/49

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Load external class
Confidence:
100%
Query the current data network type
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Read data and put it into a buffer stream
Confidence:
100%
Get location info of the device and put it to JSON object
Confidence:
100%
Connect to a URL and receive input stream from the server
Confidence:
100%
Method reflection
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Method reflection
Confidence:
100%
Connect to the remote server through the given URL
Confidence:
100%
Query data from URI (SMS, CALLLOGS)
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Connect to a URL and set request method
Confidence:
100%
Get specific method from other Dex files
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Content provider
       com/best_la/caller/screen/themes_3d/Reciver/PhoneCallReceiver.java
Get system service
       com/best_la/caller/screen/themes_3d/Adapter/ImageAdapterActivity.java
com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
Inter process communication
       com/karumi/dexter/Dexter.java
com/karumi/dexter/DexterActivity.java
com/best_la/caller/screen/themes_3d/MyCustomDialog.java
com/karumi/dexter/DexterInstance.java
com/best_la/caller/screen/themes_3d/MainActivity.java
com/best_la/caller/screen/themes_3d/Reciver/PhoneCallReceiver.java
com/karumi/dexter/listener/single/SnackbarOnDeniedPermissionListener.java
com/karumi/dexter/listener/multi/SnackbarOnAnyDeniedMultiplePermissionsListener.java
com/best_la/caller/screen/themes_3d/SplashActivity_new.java
com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
com/best_la/caller/screen/themes_3d/CallScreen/CallerScreen.java
com/karumi/dexter/IntentProvider.java
com/best_la/caller/screen/themes_3d/Reciver/CallReceiver.java
Java reflection
       com/rom4ek/arcnavigationview/ArcNavigationView.java
com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
com/wang/avi/AVLoadingIndicatorView.java
Local file i/o operations
       com/best_la/caller/screen/themes_3d/Util/utils.java
Sending broadcast
       com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
Starting activity
       com/best_la/caller/screen/themes_3d/MainActivity.java
com/karumi/dexter/listener/single/SnackbarOnDeniedPermissionListener.java
com/karumi/dexter/listener/multi/SnackbarOnAnyDeniedMultiplePermissionsListener.java
com/best_la/caller/screen/themes_3d/SplashActivity_new.java
com/best_la/caller/screen/themes_3d/MyCustomDialog.java
com/best_la/caller/screen/themes_3d/ThemeScreen/CallerTheme.java
com/best_la/caller/screen/themes_3d/CallScreen/CallerScreen.java
com/karumi/dexter/DexterInstance.java
com/best_la/caller/screen/themes_3d/Reciver/CallReceiver.java

Control flow graphs analysis

Information computed by Pithus.

The application probably lists running applications

The application probably gets different information regarding the telephony capabilities

The application probably gets the advertising ID for tracking purposes

The application probably plays sound

The application probably listens accessibility events