0/62
Threat
Analyzed on 2022-06-14T22:02:22.586661
MD5 | f0306ea2fe46d2dd79e865d3c9c3f923 | |
SHA1 | d4df35b61af1f93e2087fddc4bb77410ab6e4704 | |
SHA256 | 1813b02e1721493fff39ebf74563f6a584bddc09028018148b79a0d9c87d6816 | |
Size | 2.56MB |
Information computed with APKiD.
/tmp/tmpsxza_s0_!classes.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 49152:ZncgDZ1SJDkTXUB4ZyVP4qiu85kzPQtf/INRXj:myZ1SVkTXUBFVZlXj | |
Manifest | 384:uz56g5nPAi2eGBmprMSv1Xtu3BOWWetyi54vtcHe1F78WTzkWScZSQC:uzcg5PAi2… | |
classes.dex | 24576:ND8JWI4eaLI8w1FLAxT1/X3UXgIdXzG+Qqf:N91gAx1/X3UXgIRCgf |
Information computed with Dexofuzzy.
APK file | 1536:OK7jK0vDn/ZEb7rJ0SHiVxw/S2S2gygMH6qfmG0tUYAEX85Zk+OlEx/d:BKAO/JR… | |
classes.dex | 1536:OK7jK0vDn/ZEb7rJ0SHiVxw/S2S2gygMH6qfmG0tUYAEX85Zk+OlEx/d:BKAO/JR… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Low | App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config] The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app. |
High | Activity (eu.faircode.netguard.ActivitySettings) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (eu.faircode.netguard.ActivityForwardApproval) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Service (eu.faircode.netguard.ServiceSinkhole) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_VPN_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (eu.faircode.netguard.ServiceExternal) is not Protected. [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Service (eu.faircode.netguard.ServiceTileMain) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (eu.faircode.netguard.ServiceTileGraph) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (eu.faircode.netguard.ServiceTileFilter) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (eu.faircode.netguard.ServiceTileLockdown) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Broadcast Receiver (eu.faircode.netguard.ReceiverAutostart) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Broadcast Receiver (eu.faircode.netguard.ReceiverPackageRemoved) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Broadcast Receiver (eu.faircode.netguard.WidgetMain) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Broadcast Receiver (eu.faircode.netguard.WidgetLockdown) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
Low | Broadcast Receiver (eu.faircode.netguard.WidgetAdmin) is Protected by a permission.Permission: eu.faircode.netguard.permission.ADMINprotectionLevel: signature[android:exported=true] A Broadcast Receiver is found to be exported, but is protected by permission. |
Medium | High Intent Priority (999)[android:priority] By setting an intent priority higher than another intent, the app effectively overrides other requests. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 1981, 1:01 a.m. |
Latest file found in APK | Jan. 1, 1981, 1:01 a.m. |
Certificate valid not before | Oct. 24, 2015, 1:10 p.m. |
First submission on VT | June 14, 2022, 1:20 p.m. |
Last submission on VT | June 14, 2022, 1:20 p.m. |
Upload on Pithus | June 14, 2022, 10:02 p.m. |
Certificate valid not after | Oct. 17, 2040, 1:10 p.m. |
Score | 0/62 |
Report | https://www.virustotal.com/gui/file/1813b02e1721493fff39ebf74563f6a584bddc09028018148b79a0d9c87d6816/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FPT_TUD_EXT.2.1 | The application shall be distributed using the format of the platform-supported package manager. Integrity for Installation and Update |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
High | Base config is insecurely configured to permit clear text traffic to all domains. Scope: ['*'] |
Medium | Base config is configured to trust system certificates. Scope: ['*'] |
High | Base config is configured to trust user installed certificates. Scope: ['*'] |
Information computed with MobSF.
Information computed with MobSF.
https://www.dnslytics.com/whois-lookup/ https://www.speedguide.net/port.php?port= https://github.com/M66B/NetGuard/blob/master/FAQ.md#user-content-faq27 Defined in eu/faircode/netguard/ActivityLog.java |
|
https://www.dnslytics.com/whois-lookup/ https://www.speedguide.net/port.php?port= https://github.com/M66B/NetGuard/blob/master/FAQ.md#user-content-faq27 Defined in eu/faircode/netguard/ActivityLog.java |
|
https://www.dnslytics.com/whois-lookup/ https://www.speedguide.net/port.php?port= https://github.com/M66B/NetGuard/blob/master/FAQ.md#user-content-faq27 Defined in eu/faircode/netguard/ActivityLog.java |
|
https://ipinfo.io/ Defined in eu/faircode/netguard/Util.java |
|
http://xmlpull.org/v1/doc/features.html#indent-output Defined in eu/faircode/netguard/ActivityDns.java |
|
https://www.netguard.me/hosts https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts Defined in eu/faircode/netguard/ServiceExternal.java |
|
https://www.netguard.me/hosts https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts Defined in eu/faircode/netguard/ServiceExternal.java |
|
https://www.dnslytics.com/whois-lookup/ https://www.speedguide.net/port.php?port= Defined in eu/faircode/netguard/AdapterRule.java |
|
https://www.dnslytics.com/whois-lookup/ https://www.speedguide.net/port.php?port= Defined in eu/faircode/netguard/AdapterRule.java |
|
http://xmlpull.org/v1/doc/features.html#indent-output www.google.com https://www.netguard.me/hosts https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts Defined in eu/faircode/netguard/ActivitySettings.java |
|
http://xmlpull.org/v1/doc/features.html#indent-output www.google.com https://www.netguard.me/hosts https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts Defined in eu/faircode/netguard/ActivitySettings.java |
|
http://xmlpull.org/v1/doc/features.html#indent-output www.google.com https://www.netguard.me/hosts https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts Defined in eu/faircode/netguard/ActivitySettings.java |
|
http://www.netguard.me/# Defined in eu/faircode/netguard/ActivityPro.java |
|
https://play.google.com/store/apps/dev?id=8420080860664580239 https://www.netguard.me/ https://contact.faircode.eu/?product=netguardstandalone https://play.google.com/store/apps/details?id= https://github.com/M66B/NetGuard/blob/master/FAQ.md Defined in eu/faircode/netguard/ActivityMain.java |
|
https://play.google.com/store/apps/dev?id=8420080860664580239 https://www.netguard.me/ https://contact.faircode.eu/?product=netguardstandalone https://play.google.com/store/apps/details?id= https://github.com/M66B/NetGuard/blob/master/FAQ.md Defined in eu/faircode/netguard/ActivityMain.java |
|
https://play.google.com/store/apps/dev?id=8420080860664580239 https://www.netguard.me/ https://contact.faircode.eu/?product=netguardstandalone https://play.google.com/store/apps/details?id= https://github.com/M66B/NetGuard/blob/master/FAQ.md Defined in eu/faircode/netguard/ActivityMain.java |
|
https://play.google.com/store/apps/dev?id=8420080860664580239 https://www.netguard.me/ https://contact.faircode.eu/?product=netguardstandalone https://play.google.com/store/apps/details?id= https://github.com/M66B/NetGuard/blob/master/FAQ.md Defined in eu/faircode/netguard/ActivityMain.java |
|
https://play.google.com/store/apps/dev?id=8420080860664580239 https://www.netguard.me/ https://contact.faircode.eu/?product=netguardstandalone https://play.google.com/store/apps/details?id= https://github.com/M66B/NetGuard/blob/master/FAQ.md Defined in eu/faircode/netguard/ActivityMain.java |
|
www.google.com https://api.github.com/repos/M66B/NetGuard/releases/latest Defined in eu/faircode/netguard/ServiceSinkhole.java |
|
http://schemas.android.com/apk/res/android Defined in p/C0198g.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Load external class |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Query the list of the installed packages |
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Get the network operator name |
Confidence:
|
Connect to a URL and read data from it |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Query The ISO country code |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get location of the device |
Confidence:
|
Method reflection |
Confidence:
|
Get the country code of the SIM card provider |
Confidence:
|
Connect to the remote server through the given URL |
Confidence:
|
Get the time of current location |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Query the SIM card status |
Confidence:
|
Get the current WIFI information |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.