0/59
Threat
Analyzed on 2022-06-22T22:20:53.121702
MD5 | 1fe2aee1338546ef48f87c36da0b9c1c | |
SHA1 | b247b6aefda7aacd25143419aa0abfc7280d3317 | |
SHA256 | 35fa58c779ac80bcf44875e279cc4a6ba08678b0004e9c8f0816426cf0c584ab | |
Size | 0.8MB |
Information computed with APKiD.
/tmp/tmpi3og112c!classes.dex | |
yara_issue |
|
compiler |
|
Information computed with ssdeep.
APK file | 12288:l7RyfN6/MfsLgKMAGZ22joBascauWQ32M/Jlalddba3aSTHHT0qAuW:l7RyfeRLg0GZ68r0AnaldUdHHT+1 | |
Manifest | 192:pwmc12iuOTHPTyDVwSDMOF1opO06Kp+SiYHP1AY2l:pwmc19uOTHPTyDVwSDMA1op… | |
classes.dex | 12288:xp1khZAc+YMz7I5g9UeTpjfoxwg0FC15sG:SAcB4oqG |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
High | Broadcast Receiver (com.transsion.statisticalsales.BootCompletedReceiver) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Dailer Code: 862016 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
Certificate valid not before | April 16, 2019, 7:56 a.m. |
First submission on VT | March 9, 2022, 4:52 p.m. |
Last submission on VT | March 9, 2022, 4:52 p.m. |
Upload on Pithus | June 22, 2022, 10:20 p.m. |
Certificate valid not after | Sept. 1, 2046, 7:56 a.m. |
Score | 0/59 |
Report | https://www.virustotal.com/gui/file/35fa58c779ac80bcf44875e279cc4a6ba08678b0004e9c8f0816426cf0c584ab/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.1.1 | The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate']. X.509 Certificate Validation |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
IE | asv.transsion.com | 54.72.140.145 | ||
IN | asvin.transsion.com | 147.139.5.216 |
Information computed with MobSF.
https://asv.transsion.com:443/SaleStatistics/sendsale/sendSale https://asvin.transsion.com:8080/SaleStatistics/sendsale/sendSale Defined in com/transsion/statisticalsales/util/SSHttpClient.java |
|
https://asv.transsion.com:443/SaleStatistics/sendsale/sendSale https://asvin.transsion.com:8080/SaleStatistics/sendsale/sendSale Defined in com/transsion/statisticalsales/util/SSHttpClient.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Method reflection |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Query the IMSI number |
Confidence:
|
Deletes media specified by a content URI(SMS, CALL_LOG, File, etc.) |
Confidence:
|
Query the IMEI number |
Confidence:
|
Method reflection |
Confidence:
|
Query data from URI (SMS, CALLLOGS) |
Confidence:
|
Query the phone number |
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Executes the specified string Linux command |
Information computed with MobSF.
Information computed by Pithus.