0/52

Threat

com.viber.voip

Viber

Analyzed on 2022-01-17T03:03:38.280351

67

permissions

180

activities

27

services

29

receivers

116

domains

File sums

MD5 11661c55b3033a776a30ccc3812f1a81
SHA1 5e6c0e905169a1167bdd7f9802339395c92193df
SHA256 244f63e5347f4b40b73b2037e1a92bc63939a1ffa461258ab78f1cb197d69fa9
Size 50.29MB

APKiD

Information computed with APKiD.

/tmp/tmp20a68fxk!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • possible Build.SERIAL check
  • SIM operator check
  • network operator name check
  • device ID check
  • subscriber ID check
compiler
  • r8
/tmp/tmp20a68fxk!classes2.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • Build.BOARD check
  • possible Build.SERIAL check
  • Build.TAGS check
  • SIM operator check
  • network operator name check
compiler
  • r8 without marker (suspicious)
/tmp/tmp20a68fxk!classes3.dex
anti_vm
  • Build.MANUFACTURER check
compiler
  • r8 without marker (suspicious)
/tmp/tmp20a68fxk!classes4.dex
anti_vm
  • Build.MANUFACTURER check
  • network operator name check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)
/tmp/tmp20a68fxk!classes5.dex
anti_vm
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • possible Build.SERIAL check
  • Build.TAGS check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 786432:HcpcHjFByMUo0Qxx8BfSRvliodu3S9CFHEHHXPmcmU:HcqjFByvOxSBfSllddu3ACNAfD
Manifest 768:XIQzsupfPAb/rKTcISEertX/RxcKlmP6XS4K15A/FSbqUQtcm1TYo9OdJhe3LCNP:…
classes.dex 49152:fuBGcqivKZBrRSu7sOtmPuqWt4FUB72xwZVY3jgPUtNMuT/kQYK623pSO+I1uR8…
classes2.dex 98304:+oxWWkf7fkEwQGRyA+GEF6POnl+30mFfs:+KWWkD8xRHZQ6mEE
classes3.dex 98304:cApPfOTGudw7A4JRHo5sn9UnJHN1oliOY:cApPfOTpw77RHFwlOY
classes4.dex 49152:OOgySKO6K0DJ+wXL5hww+v8z4v6hrfVmiIt4j7Vn4a9f5QUkU4X6F4qe:ZPdO6K…
classes5.dex 24576:AmyGm0K3FwQjWgc6si1qp4fWdqJCv2M1w7YJZcinS52WHlqAfEVd6a4jUIKBzeP…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 24576:NH9Rf1vGQn1NpBSNKnIpjAtYXSLbbbbVUFRZUpBgyOh1nkfKgfolMoCZyUfh7al…
classes.dex 12288:VXeklbH9CZsf1vB42DnV3NpB6ZNkKUnTspju:NH9Rf1vGQn1NpBSNKnIpju
classes2.dex 6144:nurUtPc/X8k+LbbbbNW+8ZbV13UXDiuWFXNzirxFYzxE9iuR+AOGlAJmVY3UpS:n…
classes3.dex 6144:q16J16/ZZZozWDqrjrhAhgZZZZVZZZZTZZZZZZjZZZZTZZZZZZwZZZZZTZZZZZpN…
classes4.dex 6144:wbcjoHs0mV6Kf9aycZuDGNABldz1f7NslUW/kP8ratKdrKhJAv2IGLf:7oM0MouC…
classes5.dex 3072:HnAWabahHOPe7GvLj5sgefVN7u3p5ntoF3HXmo:gWaKipUVNy3pDoRp

APK details

Information computed with AndroGuard and Pithus.

Package com.viber.voip
App name Viber
Version name 13.7.0.6
Version code 620566
SDK 17 - 28
UAID a20d2bb99d9ced4d768a682b5377b4710b4dc811
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 321cc4640eece0ffaa043c20fadef3d6
SHA1 f836a66f8779785d51933547a1048c2e42adab9e
SHA256 6e9857865c0d4568e02ef76dc838ed282a3d24b12c7027b3926190d99b42fe09
Issuer Common Name: Unknown, Organizational Unit: R&D, Organization: Viber Media, Locality: Unknown, State/Province: Unknown, Country: Unknown
Not before 2010-12-12T16:00:55+00:00
Not after 2229-12-24T16:00:55+00:00

File Analysis

Information computed with MobSF.

Findings Files
Hardcoded Keystore found. assets/grs_sp.bks
assets/updatesdkcas.bks
com/google/api/client/googleapis/google.jks
res/raw/integration.bks
res/raw/production.bks

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Activity-Alias (com.viber.voip.WelcomeShareActivity) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High Activity-Alias (com.viber.voip.WelcomeActivityPublic) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High Launch Mode of Activity (com.viber.voip.HomeActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.registration.RegistrationActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.registration.ActivateSecondaryActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.contacts.ui.ContactsComposeCombinedActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.viber.voip.contacts.ui.ContactDetailsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.phone.PhoneFragmentActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.phone.PhoneActivityFromBackground) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.calls.ui.GroupCallDetailsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.contacts.ui.list.GroupCallStartParticipantsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.app.ViberSystemActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Broadcast Receiver (com.viber.voip.util.SDCardBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.viber.voip.util.PackageReplacedReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.viber.voip.notif.receivers.NotificationsBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Launch Mode of Activity (com.viber.voip.messages.ui.ConversationActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.messages.ui.ConversationActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Launch Mode of Activity (com.viber.voip.messages.ui.PublicAccountConversationActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.messages.ui.PublicAccountConversationActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Launch Mode of Activity (com.viber.voip.messages.conversation.publicaccount.PublicChatsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.publicaccount.ui.screen.info.PublicAccountInfoActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.publicaccount.ui.screen.info.PublicAccountInfoActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High TaskAffinity is set for Activity
(com.viber.voip.messages.ui.popup.PopupMessageActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Launch Mode of Activity (com.viber.voip.messages.ui.popup.PopupMessageActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.settings.ui.SettingsHeadersActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.AcceptTermsAndPoliciesWebActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.gsa.GoogleVoiceSearchActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.viber.voip.phone.connection.ViberConnectionService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_TELECOM_CONNECTION_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.viber.service.ServiceAutoLauncher) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Launch Mode of Activity (com.viber.voip.api.URLSchemeHandlerActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.viber.voip.api.URLSchemeHandlerActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.viber.voip.backup.ui.RestoreActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.viber.service.contacts.authentication.AccountAuthenticatorService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.viber.service.contacts.contactbook.AccountContactbookService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.viber.voip.billing.PurchaseSupportActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.rakuten.RakutenRegistrationActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.rakuten.RakutenAccountWebViewActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.ViberConnectActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.registration.AuthSecondaryActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.registration.DebugAuthSecondaryActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.gdpr.ui.birthdate.UserBirthdateActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.gdpr.ui.iabconsent.ConsentActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Broadcast Receiver (com.amazon.device.iap.ResponseReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.viber.deviceinfo.WidgetProvider) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.viber.voip.ShareChooserReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Content Provider (com.viber.voip.sound.RingtoneProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.viber.voip.registration.DeactivateSecondaryActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.permissions.IsolatedPermissionHandlerActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.ui.KeyguardUnlockWaitActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.settings.ui.DebugFeatureActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.messages.conversation.ui.ShareScreenshotActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Launch Mode of Activity (com.viber.voip.vln.VlnActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Broadcast Receiver (com.viber.voip.registration.sms.SmsBroadcastReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Launch Mode of Activity (com.viber.voip.WakeUpViberActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (androidx.sharetarget.ChooserTargetServiceCompat) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_CHOOSER_TARGET_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INSTALL_PACKAGES [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Launch Mode of Activity (com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.yandex.metrica.MetricaService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.yandex.metrica.MetricaEventHandler) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.yandex.metrica.ConfigurationServiceReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushMsgReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.viber.voip.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.viber.voip.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Service (com.huawei.hms.support.api.push.service.HmsMsgService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Content Provider (com.huawei.hms.support.api.push.PushProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.viber.voip.permission.PUSH_PROVIDER
protectionLevel: signatureOrSystem [android:exported=true]
A Content Provider is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Broadcast Receiver (com.appboy.receivers.AppboyActionReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (999)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.viber.voip.api.URLSchemeHandlerActivity

Hosts: invite.viber.com unv.viber.com

Schemes: https:// viber:// viber-test://

Main Activity

Information computed with AndroGuard.

com.viber.voip.WelcomeActivity

Activities

Information computed with AndroGuard.

com.viber.voip.WelcomeActivity
com.viber.voip.HomeActivity
com.viber.voip.registration.RegistrationActivity
com.viber.voip.registration.ActivateSecondaryActivity
com.viber.voip.registration.SelectCountryActivity
com.viber.voip.contacts.ui.ContactsCompose1to1ListActivity
com.viber.voip.contacts.ui.ContactsComposeListActivity
com.viber.voip.contacts.ui.ConferenceContactsComposeListActivity
com.viber.voip.contacts.ui.ContactsComposeCombinedActivity
com.viber.voip.contacts.ui.AdminSelectorActivity
com.viber.voip.messages.conversation.community.CreateCommunityActivity
com.viber.voip.publicaccount.wizard.CreatePublicAccountWizardActivity
com.viber.voip.publicaccount.wizard.SetupInboxWizardActivity
com.viber.voip.user.PublicGroupParticipantDetailsActivity
com.viber.voip.contacts.ui.InviteContactsListActivity
com.viber.voip.contacts.ui.PublicGroupInviteContactsListActivity
com.viber.voip.messages.ui.media.ViewMediaActivity
com.viber.voip.messages.ui.media.WinkViewMediaActivity
com.viber.voip.messages.ui.media.simple.ViewMediaSimpleActivity
com.viber.voip.gallery.selection.SelectionGallery
com.viber.voip.gallery.selection.AddMoreGallery
com.viber.voip.backgrounds.ui.BackgroundGalleryActivity
com.viber.voip.backgrounds.ui.SelectBackgroundForVibeActivity
com.viber.voip.backgrounds.ui.CommunitySelectBackgroundActivity
com.viber.voip.user.more.MoreActivity
com.viber.voip.user.viberid.connectaccount.ViberIdConnectActivity
com.viber.voip.user.EditInfoActivity
com.viber.voip.user.PhotoSelectionActivity
com.viber.voip.contacts.ui.ContactDetailsActivity
com.viber.voip.phone.PhoneFragmentActivity
com.viber.voip.calls.ui.GroupCallDetailsActivity
com.viber.voip.contacts.ui.list.GroupCallStartParticipantsActivity
com.viber.voip.app.ViberSystemActivity
com.viber.voip.AcceptTermsAndPoliciesDialogActivity
com.viber.voip.user.UserProfilePreviewActivity
com.viber.voip.messages.ui.ConversationActivity
com.viber.voip.messages.ui.PublicAccountConversationActivity
com.viber.voip.messages.conversation.publicaccount.PublicChatsActivity
com.viber.voip.publicaccount.ui.screen.info.PublicAccountInfoActivity
com.viber.voip.publicaccount.ui.screen.info.PublicAccountEditActivity
com.viber.voip.messages.ui.ConversationGalleryActivity
com.viber.voip.messages.ui.media.LocationMessageActivityV2
com.viber.voip.messages.ui.popup.PopupMessageActivity
com.viber.voip.settings.ui.SettingsHeadersActivity
com.viber.voip.settings.ui.BackupSettingsActivity
com.viber.voip.backup.ui.promotion.AutoBackupPromotionActivity
com.viber.voip.settings.ui.ManageSecondariesSettingsActivity
com.viber.voip.settings.ui.PurchasesSettingsActivity
com.viber.voip.SplashActivity
com.viber.voip.AboutActivity
com.viber.voip.market.StickerMarketActivity
com.viber.voip.market.ViberOutWelcomeActivity
com.viber.voip.market.GenericMarketDialogActivity
com.viber.voip.market.ExplorePublicGroupsActivity
com.viber.voip.market.CommunityInsightsActivity
com.viber.voip.market.VOPurchaseDialogActivity
com.viber.voip.market.CallFailedDialogActivity
com.viber.voip.market.StickerPurchaseDialogActivity
com.viber.voip.market.MarketSettingsActivity
com.viber.voip.ui.GenericWebViewActivity
com.viber.voip.AcceptTermsAndPoliciesWebActivity
com.viber.voip.banner.RemoteSplashActivity
com.viber.voip.messages.ui.media.GoogleApiMapPreviewActivityV2
com.viber.voip.messages.ui.media.WebMapPreViewActivity
com.viber.voip.viberout.ui.CreditCardCheckoutWebActivity
com.viber.voip.viberout.ui.CallingPlansSuggestionWebActivity
com.viber.voip.viberout.ui.RedeemCouponWebActivity
com.viber.voip.viberout.ui.FreeOfferWebActivity
com.viber.voip.viberout.ui.ViberOutAccountActivity
com.viber.voip.viberout.ui.TermsAndConditionsActivity
com.android.camera.CropImage
com.viber.voip.gsa.GoogleVoiceSearchActivity
com.viber.voip.MessageInfoActivity
com.viber.voip.api.URLSchemeHandlerActivity
com.viber.voip.api.InternalActionActivity
com.viber.voip.backup.ui.RestoreActivity
com.viber.voip.viberout.ui.CheckPurchaseActivity
com.viber.voip.viberout.ui.ViberOutDialogs
com.viber.voip.viberout.ui.ViberOutDialogsLegacy
com.viber.voip.billing.PurchaseSupportActivity
com.viber.voip.block.BlockListActivity
com.viber.voip.FileManagerActivity
com.viber.voip.rakuten.RakutenRegistrationActivity
com.viber.voip.rakuten.RakutenAccountWebViewActivity
com.viber.voip.news.ViberNewsWebActivity
com.viber.voip.news.ViberNewsArticleBrowserActivity
com.viber.voip.AddFriendActivity
com.viber.voip.AddFriendPreviewActivity
com.viber.voip.ViberConnectActivity
com.viber.voip.qrcode.ScannerActivity
com.viber.voip.MyQRCodeActivity
com.viber.voip.registration.AuthSecondaryActivity
com.viber.voip.registration.DebugAuthSecondaryActivity
com.viber.voip.contacts.ui.TrustedContactsActivity
com.viber.voip.calls.ui.RecentCallsActivity
com.viber.voip.calls.ui.KeypadActivity
com.viber.voip.contacts.ui.HiddenChatsSettingsActivity
com.viber.voip.settings.ui.ProxySettingsPreferenceActivity
com.viber.voip.settings.ui.personal.PersonalDataSettingsActivity
com.viber.voip.settings.ui.personal.request.RequestYourDataSettingsActivity
com.viber.voip.settings.ui.personal.delete.DeleteYourDataSettingsActivity
com.viber.voip.gdpr.ui.birthdate.UserBirthdateActivity
com.viber.voip.gdpr.ui.iabconsent.ConsentActivity
com.viber.voip.registration.changephonenumber.ChangePhoneNumberActivity
com.viber.voip.camrecorder.CustomCamTakeVideoActivity
com.viber.voip.camrecorder.preview.MediaPreviewActivity
com.viber.voip.camrecorder.preview.DoodleActivity
com.viber.voip.camrecorder.preview.EditTextActivity
com.viber.voip.messages.ui.media.player.FullScreenVideoPlayerActivity
com.viber.voip.invitelinks.linkscreen.ShareGroupLinkActivity
com.viber.voip.invitelinks.linkscreen.ShareCommunityFollowerLinkActivity
com.vk.sdk.VKServiceActivity
com.viber.voip.viberout.ui.ViberOutReferralActivity
com.appboy.ui.AppboyWebViewActivity
com.viber.voip.registration.changephonenumber.CarrierChangedSplashActivity
com.viber.voip.banner.view.BlockedUserSplashActivity
com.viber.voip.messages.extensions.activity.ChatExtensionPanelActivity
com.viber.voip.ads.StickerClickerWebViewActivity
com.viber.voip.banner.notificationsoff.GlobalNotificationSplashActivity
com.viber.voip.registration.DeactivateActivity
com.viber.voip.registration.DeactivateSecondaryActivity
com.viber.voip.messages.extensions.activity.ChatExInternalBrowserActivity
com.viber.voip.messages.extensions.activity.ChatExInternalBrowserPartialSizeActivity
com.viber.voip.messages.conversation.ui.edit.group.GroupAddDetailsActivity
com.viber.voip.engagement.SayHiToFriendsActivity
com.viber.voip.BringAppToFrontActivity
com.viber.voip.permissions.IsolatedPermissionHandlerActivity
com.viber.voip.ui.KeyguardUnlockWaitActivity
com.viber.voip.messages.conversation.ui.CommunityIntroActivity
com.viber.voip.group.participants.settings.ParticipantsSettingsActivity
com.viber.voip.group.participants.ban.BannedParticipantsListActivity
com.viber.voip.messages.conversation.commongroups.CommonGroupsActivity
com.viber.voip.settings.ui.DebugFeatureActivity
com.viber.voip.shareviber.invitescreen.InviteActivity
com.viber.voip.services.inbox.screen.BusinessInboxActivity
com.viber.voip.services.inbox.chatinfo.BusinessInboxChatInfoActivity
com.viber.voip.vln.ui.SmsInboxActivity
com.viber.voip.contacts.ui.list.ParticipantsListActivity
com.viber.voip.messages.translation.SelectLanguageActivity
com.viber.voip.messages.translation.SelectUiLanguageActivity
com.viber.voip.viberout.ui.products.ViberOutProductsActivity
com.viber.voip.viberout.ui.products.plans.info.ViberOutCallingPlanInfoActivity
com.viber.voip.viberout.ui.products.countryplans.ViberOutCountryPlansActivity
com.viber.voip.messages.conversation.ui.ShareScreenshotActivity
com.viber.voip.vln.VlnActivity
com.facebook.react.devsupport.DevSettingsActivity
com.viber.voip.messages.conversation.ui.vote.ForwardCreatePollActivity
com.viber.voip.messages.conversation.ui.vote.VoteActivity
com.viber.voip.WakeUpViberActivity
com.mopub.common.MoPubBrowser
com.viber.voip.messages.ui.forward.sharelink.ShareLinkActivity
com.viber.voip.messages.ui.forward.improved.ImprovedForwardActivity
com.viber.voip.messages.ui.forward.addtogroups.AddParticipantToGroupsActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.viber.voip.rakuten.games.RakutenGamesWebActivity
com.viber.voip.stickers.custom.sticker.CreateCustomStickerActivity
com.viber.voip.stickers.custom.pack.CreateStickerPackActivity
com.viber.voip.engagement.DebugBotsAndCommunitiesActivity
com.viber.voip.ui.searchbyname.SbnIntroActivity
com.viber.voip.ui.editgroupinfo.EditGroupInfoActivity
com.viber.voip.camera.activity.ViberCcamInternalSettingsActivity
com.appboy.ui.activities.AppboyFeedActivity
com.appboy.ui.activities.AppboyContentCardsActivity
com.appboy.push.AppboyNotificationRoutingActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.google.android.gms.ads.AdActivity
com.my.target.common.MyTargetActivity
com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity
com.google.android.play.core.common.PlayCoreDialogWrapperActivity
com.jakewharton.processphoenix.ProcessPhoenix
com.yandex.mobile.ads.AdActivity
com.huawei.hms.activity.BridgeActivity
com.huawei.hms.activity.EnableServiceActivity
com.huawei.updatesdk.service.otaupdate.AppUpdateActivity
com.huawei.updatesdk.support.pm.PackageInstallerActivity
com.android.billingclient.api.ProxyBillingActivity

Receivers

Information computed with AndroGuard.

com.viber.voip.util.SDCardBroadcastReceiver
com.viber.voip.util.PackageReplacedReceiver
com.viber.voip.notif.receivers.NotificationsBroadcastReceiver
com.viber.voip.notif.receivers.PendingIntentBroadcastReceiver
com.viber.service.ServiceAutoLauncher
com.viber.voip.gdpr.GdprUserBirthdayWatcher
com.amazon.device.iap.ResponseReceiver
com.viber.deviceinfo.WidgetProvider
com.viber.voip.ShareChooserReceiver
com.viber.voip.registration.RegistrationReminderMessageReceiver
com.viber.voip.registration.sms.SmsBroadcastReceiver
com.viber.voip.messages.conversation.reminder.ConversationReminderReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
com.appboy.AppboyFcmReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.yandex.metrica.MetricaEventHandler
com.yandex.metrica.ConfigurationServiceReceiver
com.huawei.hms.support.api.push.PushMsgReceiver
com.huawei.hms.support.api.push.PushReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver
com.appboy.receivers.AppboyActionReceiver

Services

Information computed with AndroGuard.

com.viber.service.ViberPhoneService
com.viber.voip.fcm.PushJobService
com.viber.voip.gsa.GoogleVoiceSearchService
com.viber.service.VoipConnectorService
com.viber.voip.phone.connection.ViberConnectionService
com.viber.service.contacts.authentication.AccountAuthenticatorService
com.viber.service.contacts.contactbook.AccountContactbookService
com.viber.voip.storage.service.MediaLoadingService
com.viber.voip.fcm.GoogleFcmService
com.viber.voip.fcm.HuaweiFcmService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
com.viber.voip.videoconvert.DefaultVideoConversionService
androidx.sharetarget.ChooserTargetServiceCompat
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
androidx.room.MultiInstanceInvalidationService
com.yandex.metrica.MetricaService
com.yandex.metrica.ConfigurationService
com.yandex.metrica.ConfigurationJobService
com.huawei.hms.support.api.push.service.HmsMsgService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService
com.huawei.agconnect.core.ServiceDiscovery

Sample timeline

Certificate valid not before Dec. 12, 2010, 4 p.m.
First submission on VT Aug. 26, 2020, 9:20 p.m.
Last submission on VT Dec. 26, 2021, 5:57 p.m.
Upload on Pithus Jan. 17, 2022, 3:03 a.m.
Certificate valid not after Dec. 24, 2229, 4 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity', 'camera', 'location', 'bluetooth', 'microphone'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['call lists', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_CKM.1.1(3)
FCS_CKM.1.2(3)
A password/passphrase shall perform [Password-based Key Derivation Functions] in accordance with a specified cryptographic algorithm..
Password Conditioning
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate', 'RFC 5280 certificate validation and certificate path validation'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update
FCS_CKM.1.1(2) The application shall generate symmetric cryptographic keys using a Random Bit Generator as specified in FCS_RBG_EXT.1 and specified cryptographic key sizes 128 bit or 256 bit.
Cryptographic Symmetric Key Generation

Code analysis

Information computed with MobSF.

Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 d/i/c/a/e/c.java
d/i/c/a/b/d/d.java
com/viber/voip/pixie/PixieControllerNativeImpl.java
f/a/a/a/f.java
com/viber/voip/util/nf.java
com/viber/deviceinfo/WidgetProvider.java
f/a/a/a/q.java
com/huawei/hms/framework/common/PackageUtils.java
com/amazon/device/iap/PurchasingService.java
com/viber/voip/util/http/DefaultOkHttpClientFactory.java
com/viber/voip/phone/call/CallHandler.java
com/huawei/hms/framework/common/BuildConfig.java
com/huawei/updatesdk/UpdateSdkAPI.java
com/huawei/hms/api/HuaweiApiAvailability.java
com/viber/voip/Ma.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/viber/voip/audioptt/b.java
com/huawei/hms/support/common/ActivityMgr.java
com/huawei/hms/support/api/PendingResultImpl.java
com/yandex/metrica/impl/ob/cf.java
com/huawei/hms/aaid/HmsInstanceId.java
d/q/b/d.java
com/huawei/hms/utils/SHA256.java
com/swmansion/gesturehandler/react/j.java
com/huawei/hms/update/ui/k.java
com/huawei/hms/push/RemoteMessage.java
com/huawei/hms/activity/a.java
com/reactnativecommunity/webview/RNCWebViewModule.java
com/huawei/hms/push/b/a.java
com/huawei/hms/aaid/init/a.java
com/mopub/volley/toolbox/DiskBasedCache.java
d/e/g/c/i.java
com/huawei/agconnect/core/a/c.java
d/i/a/a/a/i.java
com/huawei/hms/adapter/b/a.java
d/h/b/d/a/c/F.java
com/viber/voip/s/b/b/a.java
com/huawei/hms/push/c/b.java
com/viber/voip/h/e/b/a.java
com/huawei/hms/update/ui/g.java
com/huawei/hms/common/internal/HuaweiApiManager.java
com/huawei/hms/aaid/c/d.java
d/m/a/a/f/a/d.java
com/huawei/hms/push/HmsMessageService.java
com/yandex/metrica/impl/ob/cu.java
d/m/a/a/k.java
com/mopub/volley/toolbox/ImageRequest.java
com/huawei/hms/aaid/b/c.java
com/huawei/hms/api/HuaweiApiClient.java
com/huawei/hms/push/ups/UPSService.java
d/i/a/a/a/e.java
com/huawei/hms/utils/Util.java
com/huawei/hms/activity/BridgeActivity.java
com/viber/voip/h/C1739b.java
com/amazon/device/iap/internal/a/c.java
d/q/b/b/j.java
com/huawei/hms/update/b/b.java
com/mopub/mraid/MraidController.java
com/reactnativecommunity/webview/c.java
d/q/b/b/b.java
com/huawei/updatesdk/a/b/d/b.java
com/huawei/hms/aaid/c/a.java
com/amazon/device/iap/internal/e.java
com/huawei/hms/common/HuaweiApi.java
com/my/target/Zb.java
com/viber/voip/camera/activity/p.java
com/amazon/device/iap/internal/a/a.java
com/huawei/hms/framework/common/Logger.java
com/huawei/hms/support/api/push/b/c/a.java
d/h/b/d/a/c/C4310g.java
com/appboy/f/d.java
org/greenrobot/eventbus/util/ErrorDialogManager.java
com/huawei/hms/support/api/push/PushReceiver.java
com/huawei/hms/api/IPCTransport.java
com/viber/svg/jni/SvgRenderer.java
d/m/a/a/F.java
com/huawei/updatesdk/a/a/c/a/a.java
com/huawei/hms/update/ui/e.java
com/huawei/hms/utils/IOUtils.java
com/huawei/hms/support/api/client/ResolvingResultCallbacks.java
com/mopub/volley/toolbox/BasicNetwork.java
com/mopub/volley/CacheDispatcher.java
d/m/a/a/v.java
com/huawei/hms/adapter/AvailableAdapter.java
com/viber/voip/ads/mediation/dfp/yandex/YandexBannerAdapter.java
com/huawei/hms/utils/FileUtil.java
com/huawei/hms/support/api/push/PushMsgReceiver.java
com/huawei/hms/update/ui/l.java
com/huawei/hms/support/hianalytics/HiAnalyticsUtil.java
com/huawei/hms/update/ui/f.java
d/h/b/d/a/c/RunnableC4309f.java
com/mopub/common/MoPub.java
com/huawei/hms/common/internal/TaskApiCall.java
com/huawei/hms/aaid/b/b.java
com/huawei/hms/update/c/a.java
com/huawei/hms/push/HmsMessaging.java
com/huawei/hms/utils/b.java
com/huawei/hms/support/api/push/b/a.java
com/huawei/hms/support/api/ErrorResultImpl.java
d/k/a/b/h.java
com/huawei/hms/a/a.java
d/h/b/b/a/a/a.java
d/q/b/d/d.java
com/mopub/common/logging/MoPubLog.java
d/m/a/a/f/a/h.java
com/adjust/sdk/Logger.java
com/huawei/hms/utils/HMSBIInitializer.java
com/mixpanel/android/mpmetrics/InAppButton.java
d/m/a/a/f/a/b.java
f/a/a/a/c.java
com/huawei/hms/common/internal/RequestHeader.java
com/yandex/metrica/impl/ob/by.java
com/huawei/hms/update/manager/a.java
com/huawei/hms/opendevice/OpenDeviceTaskApiCall.java
com/huawei/hms/common/internal/ConnectionErrorMessages.java
com/huawei/hms/support/api/core/ConnectService.java
f/a/a/a/a/b/F.java
com/viber/voip/audioptt/a.java
com/amazon/device/iap/PurchasingService.java
com/my/target/ac.java
com/viber/voip/s/b/a/c.java
com/viber/voip/s/b/c/c.java
com/viber/voip/s/b/e/c.java
d/h/f/b/a/a/b.java
com/huawei/hms/support/api/push/PushProvider.java
d/h/b/d/a/c/C.java
org/sqlite/database/sqlite/CloseGuard.java
com/huawei/hms/update/ui/h.java
d/q/b/b/i.java
d/h/e/h.java
com/huawei/hms/update/manager/UpdateManager.java
com/huawei/hms/update/a/b.java
com/huawei/hms/aaid/init/AutoInitHelper.java
d/h/b/d/a/c/C4307d.java
com/huawei/updatesdk/UpdateSdkAPI.java
com/huawei/hms/utils/JsonUtil.java
d/m/a/a/f/a/i.java
com/huawei/hms/common/internal/BaseHmsClient.java
org/sqlite/database/sqlite/SQLiteDatabase.java
d/h/b/d/a/c/C4323u.java
d/q/b/a.java
com/huawei/hms/utils/a.java
com/viber/libnativehttp/DefaultHttpDelegate.java
d/i/c/a/b/e/b.java
com/huawei/hms/aaid/a/c.java
com/huawei/hms/aaid/init/b.java
com/huawei/hms/update/a/d.java
d/m/a/a/G.java
com/huawei/hms/support/api/push/c/a/b.java
d/i/a/a/a/h.java
com/mopub/volley/NetworkDispatcher.java
com/huawei/hms/adapter/b/b.java
org/greenrobot/eventbus/util/ErrorDialogConfig.java
com/mopub/volley/VolleyLog.java
com/viber/voip/b/C1304c.java
d/i/c/a/b/k/f.java
d/b/a/a/a.java
com/huawei/hms/support/api/opendevice/HuaweiOpendeviceApiImpl.java
com/huawei/hms/utils/PackageManagerHelper.java
com/huawei/hms/common/data/DataHolder.java
com/huawei/hms/adapter/BinderAdapter.java
com/huawei/hms/update/b/e.java
com/huawei/hms/update/ui/a.java
org/webrtc/videoengine/ViEOMXHelper.java
com/huawei/updatesdk/service/otaupdate/f.java
d/m/a/a/s.java
d/m/a/a/f/a/l.java
com/huawei/updatesdk/a/b/c/b.java
com/huawei/hms/update/b/f.java
com/huawei/hms/aaid/a/a.java
f/a/a/a/a/c/c.java
com/huawei/updatesdk/service/otaupdate/g.java
com/huawei/updatesdk/a/a/a/e.java
com/viber/voip/l/a/d.java
com/huawei/hms/support/api/push/b/d/a.java
com/mopub/volley/toolbox/HttpHeaderParser.java
com/huawei/hms/support/api/push/b/b/a.java
com/huawei/hms/support/api/push/b/a/a.java
com/huawei/hms/api/HuaweiMobileServicesUtil.java
com/huawei/hms/common/api/AvailabilityException.java
com/mopub/network/MultiAdResponse.java
com/yandex/mobile/ads/impl/pi.java
com/huawei/hms/update/ui/b.java
com/huawei/hms/api/ResolutionDelegate.java
com/huawei/hms/support/api/push/a/a.java
com/huawei/hms/support/api/push/c/a.java
d/m/a/a/C.java
com/viber/voip/ads/mediation/dfp/gap/DFPNativeEvent.java
com/huawei/hms/support/api/push/c/b/a.java
com/huawei/hms/support/api/push/b/c/c.java
com/huawei/hms/push/c/f.java
com/huawei/hms/common/internal/HmsClient.java
com/viber/voip/flatbuffers/model/util/a.java
com/yandex/mobile/ads/impl/fz.java
com/huawei/hms/aaid/a/b.java
com/mopub/common/logging/MoPubDefaultLogger.java
com/huawei/hms/support/api/push/service/HmsMsgService.java
com/huawei/hms/support/api/client/ResultCallbacks.java
com/huawei/hms/support/log/HMSDebugger.java
com/mopub/common/privacy/MoPubIdentifier.java
com/huawei/hms/adapter/BaseAdapter.java
com/vk/sdk/payments/VKPaymentsServerSender.java
com/huawei/hms/common/internal/ResponseHeader.java
com/huawei/hms/api/b.java
com/mopub/volley/toolbox/JsonRequest.java
com/huawei/hms/support/api/push/b/c/d.java
com/huawei/hms/core/aidl/e.java
com/vk/sdk/payments/VKIInAppBillingService.java
com/huawei/hms/api/BindingFailedResolution.java
d/m/a/a/f/a/k.java
org/webrtc/videoengine/VideoCaptureApi21.java
i/a/a/c.java
com/huawei/hms/push/b/c.java
com/huawei/hms/android/HwBuildEx.java
com/huawei/hms/api/HuaweiApiClientImpl.java
com/huawei/hms/api/IPCCallback.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 d/h/b/b/a/c/a/F.java
b/a/C0526zb.java
com/reactnativecommunity/asyncstorage/k.java
com/yandex/metrica/impl/ob/kt.java
com/mixpanel/android/mpmetrics/C0845z.java
com/vk/sdk/payments/VKPaymentsDatabase.java
com/yandex/metrica/impl/ob/kk.java
com/yandex/metrica/impl/ob/kj.java
d/h/b/b/a/c/a/G.java
com/yandex/metrica/impl/ob/ld.java
d/h/b/b/a/c/a/B.java
com/yandex/metrica/impl/ob/uw.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/viber/voip/registration/c/C3318b.java
com/viber/voip/messages/ui/reactions/MessageReactionInfoData.java
com/viber/voip/invitelinks/linkscreen/InviteLinkData.java
com/viber/voip/util/upload/UploaderResult.java
com/viber/voip/invitelinks/CommunityFollowerData.java
com/viber/voip/model/entity/C2774m.java
com/yandex/metrica/impl/ob/xw.java
com/viber/backup/e.java
com/viber/voip/user/editinfo/changeemail/ChangeEmailPresenter.java
com/mopub/common/Constants.java
com/viber/jni/cdr/entity/SendMessageMediaTypeFactory.java
com/vk/sdk/VKSdk.java
com/mixpanel/android/mpmetrics/UpdateDisplayState.java
com/mopub/common/DataKeys.java
com/viber/voip/model/entity/C2776o.java
com/huawei/hms/support/api/push/PushReceiver.java
com/viber/voip/q/AbstractC3284b.java
com/viber/voip/model/entity/ChatExtensionEntity.java
com/viber/voip/registration/c/g.java
com/viber/voip/model/entity/MessageEntity.java
com/appboy/a/b.java
com/viber/voip/user/viberid/ViberIdPromoStickerPackHelper.java
com/viber/voip/messages/conversation/hiddengems/jsonconfig/layers/SvgAnimationGemLayer.java
com/viber/voip/flatbuffers/model/msginfo/ChatReferralInfo.java
com/viber/jni/PhoneControllerInitializer.java
com/viber/voip/messages/orm/entity/json/action/MessageOpenUrlAction.java
com/viber/voip/registration/Z.java
com/huawei/hms/framework/common/hianalytics/HianalyticsBaseData.java
com/viber/voip/referral/NotesReferralMessageData.java
com/vk/sdk/dialogs/VKShareDialogDelegate.java
com/viber/voip/messages/conversation/hiddengems/jsonconfig/style/GemStyle.java
d/q/h/b/b/a/a.java
com/viber/voip/messages/conversation/hiddengems/jsonconfig/GemData.java
com/viber/voip/flatbuffers/model/msginfo/TechInfo.java
com/viber/voip/messages/conversation/hiddengems/jsonconfig/style/GemStyleWithDataHash.java
com/viber/voip/messages/controller/manager/C2122qb.java
com/viber/voip/billing/IabProductId.java
com/viber/voip/messages/extensions/model/ChatExtensionLoaderEntity.java
com/vk/sdk/api/VKApiConst.java
com/vk/sdk/VKAccessToken.java
com/viber/voip/pixie/ProxySettings.java
com/viber/voip/user/editinfo/changepassword/ChangePasswordPresenter.java
com/viber/voip/registration/c/t.java
com/viber/voip/model/entity/C2777p.java
com/viber/voip/react/ReactContextManager.java
com/mopub/mobileads/BaseVideoPlayerActivity.java
com/viber/voip/registration/c/d.java
com/yandex/metrica/impl/ob/fv.java
com/viber/voip/shareviber/invitescreen/b/l.java
com/viber/voip/contacts/ui/invitecarousel/a/l.java
com/viber/voip/messages/conversation/RegularConversationLoaderEntity.java
com/yandex/metrica/impl/ob/fe.java
com/viber/voip/flatbuffers/model/msginfo/publicaccount/PublicAccountMsgInfo.java
com/huawei/updatesdk/service/appmgr/bean/a.java
com/mopub/common/MoPubBrowser.java
com/viber/voip/user/editinfo/EditInfoPresenter.java
com/viber/voip/model/entity/D.java
com/viber/voip/flatbuffers/model/msginfo/MediaMetadata.java
com/viber/voip/user/viberid/ViberIdController.java
com/viber/voip/util/b/d.java
com/mopub/common/GpsHelper.java
com/viber/voip/model/a/d.java
com/huawei/hms/support/hianalytics/HiAnalyticsConstant.java
com/viber/voip/flatbuffers/model/msginfo/MsgInfo.java
com/viber/voip/messages/conversation/ConversationLoaderEntity.java
com/viber/jni/EncryptionParams.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 d/i/c/a/b/a/h.java
com/viber/voip/util/C4052ra.java
f/a/a/a/a/e/k.java
com/mopub/common/util/Utils.java
com/yandex/metrica/impl/ob/p.java
d/k/a/a/b/b.java
d/e/c/k/c.java
d/k/a/b/f.java
com/adjust/sdk/L.java
d/i/c/a/b/a/d.java
d/i/a/a/a/f.java
org/onepf/oms/appstore/NokiaStore.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 b/a/C0511wb.java
com/vk/sdk/api/httpClient/VKMultipartEntity.java
com/appboy/f/g.java
g/j/a.java
d/k/a/a/b/e.java
d/k/a/a/b/b.java
com/viber/voip/K/c/q.java
com/yandex/mobile/ads/impl/rk.java
g/j/b.java
com/vk/sdk/VKObject.java
d/q/c/a/d.java
com/viber/voip/stickers/custom/pack/CreateStickerPackPresenter.java
g/a/t.java
com/viber/voip/J/N.java
d/k/a/a/b/d.java
g/j/c.java
com/yandex/mobile/ads/impl/ro.java
com/viber/voip/engagement/e/o.java
com/adjust/sdk/Util.java
com/mixpanel/android/mpmetrics/O.java
com/yandex/metrica/impl/ob/ve.java
g/a/A.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/viber/svg/jni/PictureRasterizationInfoStorage.java
com/vk/sdk/util/VKUtil.java
d/k/a/a/b/e.java
com/viber/voip/util/Vc.java
com/appboy/f/k.java
com/my/target/C0978wa.java
com/yandex/metrica/impl/ob/vn.java
com/viber/voip/util/Hd.java
com/yandex/metrica/impl/ob/ak.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/viber/voip/storage/provider/e/a/C3480v.java
com/viber/voip/util/Ue.java
d/e/b/b/b.java
com/viber/voip/util/C3967ce.java
com/reactnativecommunity/webview/RNCWebViewModule.java
com/yandex/mobile/ads/impl/bk.java
org/webrtc/videoengine/ViEVideoSupport.java
com/viber/deviceinfo/WidgetProvider.java
com/viber/voip/storage/provider/e/b/C3495ea.java
d/e/c/i/a.java
f/a/a/a/g.java
com/viber/voip/videoconvert/util/f.java
com/viber/voip/util/Pa.java
com/viber/voip/FileManagerActivity.java
com/viber/svg/jni/PictureRasterizationInfoStorage.java
com/mopub/mraid/MraidNativeCommandHandler.java
com/viber/voip/util/Qa.java
com/viber/voip/videoconvert/util/o.java
com/viber/svg/jni/BitmapPictureRenderer.java
com/huawei/hms/update/a/d.java
com/viber/voip/Ma.java
com/viber/voip/util/upload/M.java
com/viber/common/jni/NativeLibraryLoader.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 f/a/a/a/a/e/k.java
com/viber/voip/util/http/PubKeyManager.java
com/huawei/hms/framework/network/grs/c/b/c.java
com/adjust/sdk/N.java
com/huawei/updatesdk/a/a/a/e.java
com/huawei/hms/update/b/e.java
com/viber/voip/util/http/DefaultOkHttpClientFactory.java
d/i/c/a/b/f/d.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 d/e/b/b/b.java
com/reactnativecommunity/webview/RNCWebViewModule.java
com/vk/sdk/api/photo/VKUploadImage.java
com/viber/voip/util/Pa.java
com/viber/voip/videoconvert/encoders/GifEncoder.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 com/viber/voip/messages/j.java
com/viber/voip/market/StickerMarketActivity.java
com/viber/voip/camera/fragment/b.java
com/viber/voip/util/Qd.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 com/viber/voip/market/ViberWebApiActivity.java
com/viber/voip/messages/ui/media/player/c/s.java
High
CVSS:5.4
Remote WebView debugging is enabled.
MASVS: MSTG-RESILIENCE-2
CWE-919 - Weaknesses in Mobile Applications
M1: Improper Platform Usage
Files:
 com/viber/voip/ViberApplication.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 f/a/a/a/a/b/l.java
com/my/target/M.java
com/yandex/metrica/impl/ob/br.java
High
CVSS:7.4
Insecure WebView Implementation. WebView ignores SSL Certificate errors and accept any SSL Certificate. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/viber/voip/util/l/c.java
High
CVSS:7.4
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/mopub/network/CustomSSLSocketFactory.java
Pygal Bulgaria: 100 Germany: 3700 France: 100 Hungary: 100 Netherlands: 100 Russian Federation: 1400 United States: 5100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US www.soundjay.com 192.163.208.117
US market.android.com 142.250.186.78
RU cs7062.vk.me 87.240.129.187
DE support.viber.com 143.204.215.95
DE pg.cdn.viber.com 143.204.215.68
US vbrpl.io 35.201.89.72
RU tech.yandex.com 213.180.204.242
US vb.me 18.66.112.113
DE content.cdn.viber.com 143.204.98.62
DE stickers-search.viber.com 35.156.40.215
settings.crashlytics.com
US viber.com 23.72.19.231
US say-hi.viber.com 35.170.221.194
DE gdpr.adjust.com 178.162.219.36
RU target.my.com 128.140.171.146
DE media.api.viber.com 52.58.242.52
US rakuten-games.api.viber.com 107.21.65.171
RU ad.mail.ru 94.100.180.197
DE www.themoviedb.org 99.86.7.83
RU oauth.vk.com 87.240.129.181
US abtest.api.viber.com 3.229.174.220
RU rutube.ru 178.248.233.148
vibes.integration.viber.com
US api.giphy.com 151.101.14.2
US policies.google.com 142.250.185.206
US market.api.viber.com 3.215.196.66
US secure-evs.aws.viber.com 34.205.106.128
DE www.viber.com 104.111.238.10
US s3.amazonaws.com 52.217.202.176
DE media.viber.com 143.204.98.114
RU zen.yandex.ru 213.180.204.211
US vln.viber.com 34.202.142.134
DE custom-sticker-pack.cdn.viber.com 143.204.215.103
DE stickers.viber.com 104.111.238.10
US maps.googleapis.com 142.250.185.138
US www.googleapis.com 142.250.185.74
US config.viber.com 65.9.58.5
DE market.api.integration.viber.com 3.120.78.18
play.google
US www.ietf.org 104.16.45.99
US api.mixpanel.com 130.211.34.183
RU mobile.yandexadexchange.net 87.250.250.120
DE wasabi.aws.integration.viber.com 3.65.170.10
e.crashlytics.com
US secure.viber.com 35.170.141.129
DE market.viber.com 104.111.238.10
US api-project-631272190743.firebaseio.com 35.201.97.85
US decide.mixpanel.com 107.178.240.159
DE market-api.cdn.viber.com 104.111.238.10
US www.w3.org 128.30.52.100
US tools.ietf.org 64.170.98.42
DE media.api.integration.viber.com 54.93.157.190
DE explore.api.viber.com 99.86.7.100
US www.mopub.com 192.48.236.3
JP r.viber.com 18.179.250.92
US github.com