0/60
Threat
Analyzed on 2021-12-15T03:11:42.664643
MD5 | 7127a930cc866e924dcfa0b11d303c43 | |
SHA1 | 8f8f3849f5a18e354cfe22ee898ef9303380c652 | |
SHA256 | 3a6741656f379c0ff8244fcaf13a959ee83b915b3ccd84720e6a9c0e4705f9b7 | |
Size | 32.68MB |
Information computed with APKiD.
/tmp/tmpgiquy1g7!classes.dex | |
anti_vm |
|
anti_debug |
|
compiler |
|
/tmp/tmpgiquy1g7!classes2.dex | |
anti_vm |
|
obfuscator |
|
anti_debug |
|
compiler |
|
/tmp/tmpgiquy1g7!classes3.dex | |
compiler |
|
/tmp/tmpgiquy1g7!classes4.dex | |
anti_vm |
|
compiler |
|
/tmp/tmpgiquy1g7!classes5.dex | |
anti_vm |
|
compiler |
|
/tmp/tmpgiquy1g7!classes6.dex | |
anti_vm |
|
anti_debug |
|
compiler |
|
/tmp/tmpgiquy1g7!classes7.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 786432:4OV+rdGo/CejC0VOC1j3PY6yOfFrN9uWQCHS2NrlQB1kmQV9UK4:4OV+L1e0z1j3AUn9QCBNmkZ8 | |
Manifest | 768:kQ1zljPPlT6U07K3SEN2/RxcKE6JH/ic7/FSbqUQt+ITMaYo9OeZ/i3KJ3yn0GAA:… | |
classes.dex | 98304:9iy9x3u4zEISGG0bB5yYqD83jPpCBSMR+0YiuckeOXB8b0:9isfbBEmoP9Oab0 | |
classes2.dex | 49152:/ywoGgeIoAhrfXWIin+VjmHZ9TOvZix5T9Jdu7E7yEWDEuCnRl/tgDwzvxD1uW3… | |
classes3.dex | 49152:jiT8JgRtccoRE/kELd9wK56aOvfyOQuFbPSvtlEzVVUijhplH+Q5:uT827oRHKd… | |
classes4.dex | 49152:IhE6LVpAma3YE91GKnui7fPV+019qa33MYVnm2m+XR:IXxa31zhj/qan3m2m+h | |
classes5.dex | 49152:qVFjsyfvTDlMKhutBbnxweAMFt9+l6TeyI:qcyPjKBbn/7Ft9+l6TS | |
classes6.dex | 49152:GhsNmjZzzUdiCi+TAUCgscnDfNUlS3kNP993Pe+YtZD5:GhbjZckiA6DfR0NPb2… | |
classes7.dex | 24576:M6Fr5E1H/mQOV8Xx6BGCs/Ga63oVi0IWaENIhBqRazoDJ/g+FHVojvkexyTOqZD… |
Information computed with Dexofuzzy.
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Findings | Files |
---|---|
Certificate/Key files hardcoded inside the app. |
com/clevertap/android/sdk/certificates/DigiCertGlobalRootCA.crt com/clevertap/android/sdk/certificates/DigiCertSHA2SecureServerCA.crt okhttp3/internal/publicsuffix/NOTICE stamp-cert-sha256 |
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Activity (com.application.zomato.routers.WeblinkRouter) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Activity (com.application.zomato.routers.ShortlinkRouter) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Activity (com.application.zomato.user.bookmarks.NitroBookmarksActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.application.zomato.routers.DeepLinkRouter) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Broadcast Receiver (com.appsflyer.SingleInstallBroadcastReceiver) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (net.openid.appauth.RedirectUriReceiverActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Broadcast Receiver (com.library.zomato.ordering.listeners.IncomingSmsReceiver) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.facebook.CustomTabActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Content Provider (com.library.zomato.calleridprovider.CallerIdProvider) is not Protected. [android:exported=true] A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Service (com.zomato.notifications.services.track.TrackNotificationJob) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Broadcast Receiver (com.zomato.notifications.receivers.AppUpdateBroadcastReceiver) is not Protected.An intent-filter exists. A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported. |
High | Broadcast Receiver (com.zomato.notifications.receivers.LocaleChangeBroadcastReceiver) is not Protected.An intent-filter exists. A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported. |
High | Broadcast Receiver (com.akamai.android.sdk.internal.AnaBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.c2dm.permission.SEND [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.c2dm.permission.SEND [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (com.google.android.play.core.assetpacks.AssetPackExtractionService) is not Protected. [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.amazon.identity.auth.device.workflow.WorkflowActivity) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
High | Activity (amazonpay.silentpay.RedirectUriReceiverActivity) is not Protected.An intent-filter exists. An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported. |
Medium | High Intent Priority (999)[android:priority] By setting an intent priority higher than another intent, the app effectively overrides other requests. |
Medium | High Intent Priority (999)[android:priority] By setting an intent priority higher than another intent, the app effectively overrides other requests. |
Information computed with MobSF.
com.application.zomato.activities.Splash |
Schemes: zomatobranchsdk:// |
com.application.zomato.routers.WeblinkRouter |
Hosts: www.zomato.com accounts.zomato.com Schemes: http:// https:// |
com.application.zomato.routers.ShortlinkRouter |
Hosts: *.zoma.to *.z.tt zoma.to z.tt Schemes: http:// https:// Mime types: image/* |
com.application.zomato.routers.DeepLinkRouter |
Schemes: zomato:// |
net.openid.appauth.RedirectUriReceiverActivity |
Schemes: com.application.zomato:// com.googleusercontent.apps.442739719837-c6kjl3jbqg6r27724sjg5iatlpuqetrn:// |
com.facebook.CustomTabActivity |
Hosts: cct.com.application.zomato Schemes: @string/fb_login_protocol_scheme:// fbconnect:// |
com.amazon.identity.auth.device.workflow.WorkflowActivity |
Hosts: com.application.zomato Schemes: amzn:// |
amazonpay.silentpay.RedirectUriReceiverActivity |
Hosts: amazonpay.amazon.in Schemes: amzn:// |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Certificate valid not before | Jan. 10, 2011, 6:39 p.m. |
First submission on VT | May 21, 2021, 9:53 p.m. |
Last submission on VT | Nov. 7, 2021, 12:48 p.m. |
Upload on Pithus | Dec. 15, 2021, 3:11 a.m. |
Certificate valid not after | Dec. 28, 2060, 6:39 p.m. |
Score | 0/60 |
Report | https://www.virustotal.com/gui/file/3a6741656f379c0ff8244fcaf13a959ee83b915b3ccd84720e6a9c0e4705f9b7/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application invoke platform-provided DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application implement asymmetric key generation. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['location', 'network connectivity', 'microphone', 'camera']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to ['address book']. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_RBG_EXT.2.1 FCS_RBG_EXT.2.2 |
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate. Random Bit Generation from Application |
FCS_CKM.1.1(1) | The application generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater. Cryptographic Asymmetric Key Generation |
FCS_COP.1.1(1) | The application perform encryption/decryption not in accordance with FCS_COP.1.1(1), AES-ECB mode is being used. Cryptographic Operation - Encryption/Decryption |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_COP.1.1(3) | The application perform cryptographic signature services (generation and verification) in accordance with a specified cryptographic algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater. Cryptographic Operation - Signing |
FCS_COP.1.1(4) | The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] . Cryptographic Operation - Keyed-Hash Message Authentication |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.1.1 | The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate', 'RFC 5280 certificate validation and certificate path validation']. X.509 Certificate Validation |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
FIA_X509_EXT.2.2 | When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate. X.509 Certificate Authentication |
FPT_TUD_EXT.2.1 | The application shall be distributed using the format of the platform-supported package manager. Integrity for Installation and Update |
FCS_CKM.1.1(2) | The application shall generate symmetric cryptographic keys using a Random Bit Generator as specified in FCS_RBG_EXT.1 and specified cryptographic key sizes 128 bit or 256 bit. Cryptographic Symmetric Key Generation |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.