0/64

Threat

com.softissimo.reverso.context

Reverso Context

Analyzed on 2022-08-28T23:10:42.886913

22

permissions

118

activities

37

services

23

receivers

123

domains

File sums

MD5 5df832bf0d231e8961de5ac92d8ee820
SHA1 f667de4e80304c31b092837d8e53ec7b30da6ee4
SHA256 42966fb73f4e3d4f85950b6d1071f321cba06ddebf54d9c0e858394bfc7f47ef
Size 32.96MB

APKiD

Information computed with APKiD.

/tmp/tmplwk2wn6o!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • network operator name check
  • possible VM check
compiler
  • dexlib 2.x
/tmp/tmplwk2wn6o!classes2.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • SIM operator check
  • network operator name check
compiler
  • dexlib 2.x
/tmp/tmplwk2wn6o!classes3.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • Build.TAGS check
  • network operator name check
  • possible VM check
compiler
  • dexlib 2.x
/tmp/tmplwk2wn6o!classes4.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • network operator name check
  • possible VM check
compiler
  • dexlib 2.x
/tmp/tmplwk2wn6o!classes5.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.TAGS check
  • SIM operator check
  • network operator name check
  • possible VM check
compiler
  • dexlib 2.x
/tmp/tmplwk2wn6o!classes6.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • possible Build.SERIAL check
  • Build.TAGS check
  • network operator name check
  • possible VM check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 786432:Q2TEmLTCqrMofA4/aZhv8Hpw7KyrBihDa2Uf:QIEmL7Aofx/aZh0IKyrFdf
Manifest 1536:Kqh78pSbNpViu1igRf252nCFQ9EVdoIMWi8HTjbpcO/3:KkppVhsMW3
classes.dex 98304:B3VdSnn+oWbsTm1U7ryRA5+PcGBbL3kzFHIGWu:B3VdSnn+oWbsTm1U7ryRA5S6…
classes2.dex 98304:MMf1QKG7KK62h445bL3oD6elpRg7u3fcNmUa:MMwymelpuuOa
classes3.dex 49152:qcb+0QIzjGZHXLnfJ370IKFHZ4tQtfRClijgmWSqynesJ1Zh4S8n1JNcQnWAa:q…
classes4.dex 98304:a2FKJ+tDbZCUdbtZMy6UduUdFHSC5wuv+kPa:a24JgZBHSCdPa
classes5.dex 49152:0Aua3/bHz/Cx4Vuaa7cgxWRnxU7yn0k+6bIha1W/tUXLR:x3jH8WvJn0k+1ha8+R
classes6.dex 49152:5GxFGaRtdTIRJYv6Ld/IBnU2pB15muj+qI3L3ce9hPD45o:5GxF1Rn8JiJUiB15…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 24576:9gFjWpFmu/SRqVqLVMNJt60Bc30VES26VqcZQ4UyvB8l9E8Dd0E:mFjWppSRq60…
classes.dex 3072:D9tMeJxyPALy8B87vMu7YtfWQJ/JtXqTRNjCOW4XhEYeHPsgShHn4HmdWhuNSB25…
classes2.dex 6144:Kp9d9gD7SZZWq/ogmyHfoVcs7JvDuvXSRqjiar:Kp9dmDGMyHubuvXSRqVr
classes3.dex 6144:QX2QNNNyYaO+7F1yyyyyyyyKyyyyyyyyVI68NzIAE6vnz8g/6deqgc39IR1H1hrd…
classes4.dex 6144:vZcxozkO24yJhLjcZ9GZzm9HU/fvBTvjcA+xQGvyDgft:vko4SyPLt8VMBjjcdrv…
classes5.dex 6144:xAQvfUyK45BPMTTusqonMOLfmQWu9RW/BJ1RI:tUyvB87LN9qBJM
classes6.dex 6144:QkuOTr45L8d/uvhGRM7OYWFKxmIggqKiiA:QkbdGeYodnKE

APK details

Information computed with AndroGuard and Pithus.

Package com.softissimo.reverso.context
App name Reverso Context
Version name 10.6.4
Version code 10000068
SDK 21 - 31
UAID 86fcbd988c12a71d0571f01f86d5595478bbfbff
Signature Signature V1 Signature V2 Signature V3
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 e89b158e4bcf988ebd09eb83f5378e87
SHA1 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
SHA256 a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Issuer Email Address: android@android.com, Common Name: Android, Organizational Unit: Android, Organization: Android, Locality: Mountain View, State/Province: California, Country: US
Not before 2008-02-29T01:33:46+00:00
Not after 2035-07-17T01:33:46+00:00

File Analysis

Information computed with MobSF.

Findings Files
Hardcoded Keystore found. com/google/api/client/googleapis/google.jks

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Broadcast Receiver (com.softissimo.reverso.context.widget.screen.small.AppSmallWidget) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.softissimo.reverso.context.widget.screen.large.AppLargeWidget) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.softissimo.reverso.context.activity.CTXWebRedirectActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.facebook.FacebookContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.softissimo.reverso.context.concurrent.DownloadOfflineDictionaryService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.softissimo.reverso.context.local_notifications.CTXClipboardBroadcastReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.softissimo.reverso.context.activity.CTXSettingsActivity$ClipboardTranslationReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.batch.android.BatchPushMessageReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.facebook.CustomTabActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.google.firebase.auth.internal.GenericIdpActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.google.firebase.auth.internal.RecaptchaActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.ogury.core.internal.OguryLogEnablerReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (net.pubnative.lite.sdk.receiver.VolumeChangedActionReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.

Browsable activities

Information computed with MobSF.

com.softissimo.reverso.context.activity.CTXWebRedirectActivity

Hosts: context.reverso.net

Schemes: reversocontext:// http:// https://

Mime types: text/*

com.facebook.CustomTabActivity

Hosts: cct.com.softissimo.reverso.context

Schemes: fbconnect://

com.google.firebase.auth.internal.GenericIdpActivity

Hosts: firebase.auth

Schemes: genericidp://

com.google.firebase.auth.internal.RecaptchaActivity

Hosts: firebase.auth

Schemes: recaptcha://

Main Activity

Information computed with AndroGuard.

com.softissimo.reverso.context.activity.SplashActivity

Activities

Information computed with AndroGuard.

com.softissimo.reverso.context.activity.SplashActivity
com.softissimo.reverso.context.activity.CTXSearchActivity
com.softissimo.reverso.context.activity.CTXSearchResultsActivity
com.softissimo.reverso.context.activity.CTXPronunciationActivity
com.softissimo.reverso.context.activity.CTXRecordActivity
com.softissimo.reverso.context.activity.CTXHistoryActivity
com.softissimo.reverso.context.activity.CTXRateApplicationActivity
com.softissimo.reverso.context.activity.CTXFavoritesActivity
com.softissimo.reverso.context.activity.CTXTellAFriendActivity
com.softissimo.reverso.context.activity.CTXLearningStatisticsPopUp
com.softissimo.reverso.context.activity.CTXLearnSettingsPopUp
com.softissimo.reverso.context.activity.CTXDialogDeleteAllActivity
com.softissimo.reverso.context.activity.CTXUpgradeActivity
com.softissimo.reverso.context.activity.UpgradeActivity
com.softissimo.reverso.context.activity.CTXOnboardingUpgradeActivity
com.softissimo.reverso.context.activity.CTXIlustrationsActivity
com.facebook.FacebookActivity
com.softissimo.reverso.context.activity.CTXWebRedirectActivity
com.softissimo.reverso.context.activity.CTXTextCopiedDialogActivity
com.google.android.gms.ads.AdActivity
com.softissimo.reverso.context.activity.CTXTranslationWebView
com.softissimo.reverso.context.activity.CTXTranslationActivity
com.softissimo.reverso.context.activity.CTXEditTranslationActivity
com.softissimo.reverso.context.activity.CTXLoginWithReversoActivity
com.softissimo.reverso.context.activity.CTXLogInActivity
com.softissimo.reverso.context.activity.CTXForgotPasswordActivity
com.softissimo.reverso.context.activity.CTXRegistrationActivity
com.softissimo.reverso.context.activity.CTXFacebookAccountActivity
com.softissimo.reverso.context.activity.CTXReversoAccountActivity
com.softissimo.reverso.context.activity.LogOutDialogActivity
com.softissimo.reverso.context.activity.FeedbackActivity
com.softissimo.reverso.context.activity.CTXTutorialActivity
com.softissimo.reverso.context.activity.CTXMediaPlayerActivity
com.softissimo.reverso.context.activity.CTXDiscoverAndLearnActivity
com.softissimo.reverso.context.activity.CTXFlashCardRecyclerActivity
com.softissimo.reverso.context.activity.CTXDictionaryDetailsActivity
com.softissimo.reverso.context.activity.CTXSettingsActivity
com.softissimo.reverso.context.activity.CTXNewConjugationActivity
com.softissimo.reverso.context.activity.CTXNewSynonymActivity
com.softissimo.reverso.context.activity.CTXTextSizeActivity
com.softissimo.reverso.context.activity.CTXVoiceSpeedActivity
com.softissimo.reverso.context.activity.CTXUsageAndStatisticsActivity
com.softissimo.reverso.context.activity.CTXAboutActivity
com.softissimo.reverso.context.activity.CTXServiceStatusActivity
com.softissimo.reverso.context.activity.CTXFlashcardsInfoActivity
com.softissimo.reverso.context.activity.CTXSingleFlashcardsInfoActivity
com.softissimo.reverso.context.activity.CTXFlashcardsStatusInfoActivity
com.softissimo.reverso.context.activity.CTXWordToDiscoverActivity
com.softissimo.reverso.context.activity.CTXSingleVoiceSettings
com.softissimo.reverso.context.activity.CTXInfoLearnActivity
com.softissimo.reverso.context.activity.CTXOfflineDictionaryListActivityV2
com.softissimo.reverso.context.activity.CTXDiscoverAndLearnPopUp
com.softissimo.reverso.context.activity.CTXFlashcardAnswerPopUp
com.softissimo.reverso.context.activity.NextGameWordsActivity
com.softissimo.reverso.context.activity.CTXAddFavoriteActivity
com.softissimo.reverso.context.activity.CTXOcrActivity
com.softissimo.reverso.context.activity.CTXNewConjugatorActivity
com.facebook.CustomTabMainActivity
com.facebook.CustomTabActivity
com.facebook.ads.AudienceNetworkActivity
com.intentsoftware.addapptr.internal.ad.fullscreens.MraidFullscreenActivity
com.amazon.device.ads.DTBInterstitialActivity
com.amazon.device.ads.DTBAdActivity
com.mngads.sdk.perf.view.MNGInAppWebView
com.mngads.sdk.perf.interstitial.MNGInterstitialAdActivity
com.mngads.sdk.perf.video.MNGVideoPlayerActivity
com.mngads.sdk.nativead.MNGNativeAdActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MraidActivity
com.mopub.common.MoPubBrowser
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.mobileads.RewardedMraidActivity
com.adcolony.sdk.AdColonyInterstitialActivity
com.adcolony.sdk.AdColonyAdViewActivity
com.madvertise.helper.ui.activities.VendorsActivity
com.madvertise.helper.ui.activities.VendorsDetailActivity
com.madvertise.helper.ui.activities.VendorsGoogleActivity
com.madvertise.helper.ui.activities.ManagePersonalDataActivity
com.madvertise.helper.ui.activities.FeaturesActivity
com.madvertise.helper.ui.activities.SPPurposesActivity
com.madvertise.helper.ui.activities.CMPActivity
com.criteo.publisher.CriteoInterstitialActivity
com.vungle.warren.ui.VungleActivity
com.smartadserver.android.library.ui.SASInterstitialActivity
com.google.firebase.auth.internal.GenericIdpActivity
com.google.firebase.auth.internal.RecaptchaActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.common.api.GoogleApiActivity
com.batch.android.MessagingActivity
com.batch.android.BatchActionActivity
com.batch.android.debug.BatchDebugActivity
com.ogury.cm.ConsentActivity
com.android.billingclient.api.ProxyBillingActivity
io.presage.interstitial.ui.InterstitialActivity
io.presage.interstitial.ui.InterstitialAndroid8TransparentActivity
io.presage.interstitial.ui.InterstitialAndroid8RotableActivity
io.presage.mraid.browser.ShortcutActivity
io.presage.mraid.browser.Android8AndLaterShortcutActivity
com.applovin.adview.AppLovinFullscreenActivity
com.applovin.sdk.AppLovinWebViewActivity
com.applovin.mediation.MaxDebuggerActivity
com.applovin.mediation.MaxDebuggerDetailActivity
com.applovin.mediation.MaxDebuggerMultiAdActivity
com.applovin.mediation.MaxDebuggerAdUnitsListActivity
com.applovin.mediation.MaxDebuggerAdUnitDetailActivity
com.applovin.mediation.MaxDebuggerTestLiveNetworkActivity
com.smaato.sdk.interstitial.InterstitialAdActivity
com.smaato.sdk.rewarded.widget.RewardedInterstitialAdActivity
com.smaato.sdk.core.browser.SmaatoSdkBrowserActivity
com.feedad.android.core.InterstitialAdActivity
com.appnexus.opensdk.AdActivity
net.pubnative.lite.sdk.consent.UserConsentActivity
net.pubnative.lite.sdk.interstitial.activity.MraidInterstitialActivity
net.pubnative.lite.sdk.interstitial.activity.VastInterstitialActivity
net.pubnative.lite.sdk.rewarded.activity.VastRewardedActivity
com.yoc.visx.sdk.adview.modal.VisxInterstitialActivity
com.yoc.visx.sdk.adview.modal.VisxExpandAdModalActivity
com.yoc.visx.sdk.adview.modal.VisxLandingPageModal

Receivers

Information computed with AndroGuard.

com.softissimo.reverso.context.widget.screen.small.AppSmallWidget
com.softissimo.reverso.context.widget.screen.large.AppLargeWidget
com.softissimo.reverso.context.local_notifications.CTXClipboardBroadcastReceiver
com.softissimo.reverso.context.activity.CTXSettingsActivity$ClipboardTranslationReceiver
com.batch.android.BatchPushMessageReceiver
com.facebook.CurrentAccessTokenExpirationBroadcastReceiver
com.facebook.AuthenticationTokenManager$CurrentAuthenticationTokenChangedBroadcastReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.android.gms.analytics.AnalyticsReceiver
com.batch.android.BatchPushMessageDismissReceiver
io.presage.common.profig.schedule.ProfigAlarmReceiver
com.ogury.core.internal.OguryLogEnablerReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver
net.pubnative.lite.sdk.receiver.VolumeChangedActionReceiver

Services

Information computed with AndroGuard.

com.softissimo.reverso.context.widget.screen.large.RemoteViewsServiceHistory
com.softissimo.reverso.context.widget.screen.small.SmallRemoteViewsServiceHistory
com.softissimo.reverso.context.widget.screen.large.RemoteViewsServiceFavorites
com.google.android.gms.analytics.CampaignTrackingService
com.softissimo.reverso.context.concurrent.DownloadOfflineDictionaryService
com.softissimo.reverso.context.activity.BatchPushNotificationsService
com.softissimo.reverso.context.utils.CTXRegistrationIntentService
com.softissimo.reverso.context.local_notifications.CTXClipboardTranslationService
com.softissimo.reverso.context.utils.fuzzy.CTXFuzzyService
com.softissimo.reverso.context.hover.TranslationHoverService
com.mngads.service.MNGAnalyticsService
com.google.firebase.components.ComponentDiscoveryService
com.google.firebase.messaging.FirebaseMessagingService
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.AnalyticsJobService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.mlkit.common.internal.MlKitComponentDiscoveryService
com.batch.android.BatchActionService
com.batch.android.BatchPushService
com.batch.android.BatchPushJobService
com.batch.android.BatchDisplayReceiptJobService
com.batch.android.eventdispatcher.DispatcherDiscoveryService
com.batch.android.push.PushRegistrationDiscoveryService
com.google.android.gms.ads.AdService
io.presage.common.profig.schedule.ProfigSyncIntentService
io.presage.common.profig.schedule.ProfigJobService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.applovin.impl.sdk.utils.AppKilledService
com.applovin.impl.adview.activity.FullscreenAdService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService
androidx.room.MultiInstanceInvalidationService
com.feedad.android.core.FeedAdService

Sample timeline

Certificate valid not before Feb. 29, 2008, 1:33 a.m.
Oldest file found in APK Feb. 29, 2008, 8:03 a.m.
First submission on VT Aug. 23, 2022, 3:02 p.m.
Latest file found in APK Aug. 23, 2022, 7:55 p.m.
Last submission on VT Aug. 28, 2022, 7:34 p.m.
Upload on Pithus Aug. 28, 2022, 11:10 p.m.
Certificate valid not after July 17, 2035, 1:33 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['microphone', 'camera', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(3) The application perform cryptographic signature services (generation and verification) in accordance with a specified cryptographic algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Operation - Signing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA1', 'HMAC-SHA-256'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['RFC 5280 certificate validation and certificate path validation', 'The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update
FCS_CKM.1.1(2) The application shall generate symmetric cryptographic keys using a Random Bit Generator as specified in FCS_RBG_EXT.1 and specified cryptographic key sizes 128 bit or 256 bit.
Cryptographic Symmetric Key Generation

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 defpackage/cq.java
defpackage/ddr.java
net/pubnative/lite/sdk/mraid/nativefeature/MRAIDNativeFeatureProvider.java
defpackage/epu.java
defpackage/ba.java
com/amazon/device/ads/DTBAdViewSupportClient.java
com/amazon/device/ads/DtbThreadService.java
com/amazon/device/ads/DTBAdMRAIDExpandedController.java
net/pubnative/lite/sdk/vpaid/response/VastProcessor.java
com/amazon/device/ads/DtbGooglePlayServicesAdapter.java
defpackage/fr.java
defpackage/az.java
defpackage/bx.java
com/ogury/cm/internal/accbc.java
com/amazon/device/ads/DTBAdMRAIDBannerController.java
com/batch/android/i0/b.java
com/smartadserver/android/coresdk/components/remotelogger/SCSRemoteLogUtils.java
defpackage/ded.java
com/amazon/device/ads/DtbGeoLocation.java
com/amazon/device/ads/DTBTimeTrace.java
defpackage/go.java
defpackage/cxh.java
defpackage/fa.java
net/pubnative/lite/sdk/mraid/MRAIDView.java
com/batch/android/d0/h.java
com/amazon/device/ads/DtbHttpClient.java
com/amazon/device/ads/DTBMetricsConfiguration.java
defpackage/dec.java
net/sqlcipher/database/SQLiteDatabase.java
com/amazon/device/ads/DtbFireOSServiceAdapter.java
com/amazon/device/ads/DTBAdResponse.java
com/amazon/device/ads/DtbMetrics.java
com/adcolony/sdk/c0.java
com/amazon/device/ads/DTBAdRequest.java
com/safedk/android/utils/Logger.java
defpackage/hv.java
com/safedk/android/utils/b.java
com/amazon/device/ads/AdRegistration.java
com/amazon/device/ads/DtbGooglePlayServices.java
defpackage/ds.java
defpackage/ddq.java
defpackage/gg.java
defpackage/ic.java
com/appnexus/opensdk/utils/Clog.java
net/pubnative/lite/sdk/mraid/internal/MRAIDParser.java
com/amazon/device/ads/SDKUtilities.java
com/amazon/device/ads/DTBMetricReport.java
defpackage/ee.java
defpackage/ch.java
com/amazon/device/ads/DtbDeviceRegistration.java
defpackage/jz.java
com/amazon/device/ads/DTBAdMRAIDController.java
com/smartadserver/android/coresdk/components/remotelogger/SCSRemoteLog.java
net/sqlcipher/database/SQLiteDebug.java
defpackage/fz.java
defpackage/beg.java
com/amazon/device/ads/DTBFetchFactory.java
com/amazon/device/ads/WebResourceService.java
defpackage/ak.java
defpackage/gb.java
defpackage/deg.java
defpackage/fxe.java
com/amazon/device/ads/DtbPackageNativeData.java
defpackage/ji.java
defpackage/dr.java
com/amazon/device/ads/DTBAdUtil.java
defpackage/ik.java
com/amazon/device/ads/DTBAdView.java
com/amazon/device/ads/DTBFetchManager.java
com/adcolony/sdk/f.java
defpackage/dh.java
com/amazon/device/ads/DtbCommonUtils.java
defpackage/fs.java
defpackage/fm.java
defpackage/cp.java
com/intentsoftware/addapptr/internal/module/Logger.java
net/pubnative/lite/sdk/mraid/internal/MRAIDNativeFeatureManager.java
defpackage/cs.java
defpackage/bgr.java
com/amazon/device/ads/DtbDebugProperties.java
defpackage/gc.java
com/amazon/device/ads/DTBMetricsProcessor.java
defpackage/ha.java
com/amazon/device/ads/DtbAdvertisingInfo.java
defpackage/iy.java
com/amazon/device/ads/DtbDeviceData.java
defpackage/dek.java
defpackage/deh.java
com/batch/android/d0/f.java
defpackage/ea.java
com/amazon/device/ads/DTBActivity.java
com/amazon/device/ads/DTBAdMRAIDInterstitialController.java
com/amazon/device/ads/DtbAdRequestParamsBuilder.java
com/batch/android/f/r.java
Medium
CVSS:7.4
Files may contain hardcoded sensitive information like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/smaato/sdk/richmedia/ad/RichMediaAdObject.java
com/smartadserver/android/library/json/SASMediationTrackingJSONFactory.java
net/pubnative/lite/sdk/mraid/nativefeature/MRAIDNativeFeatureProvider.java
com/applovin/mediation/ads/MaxRewardedAd.java
com/applovin/sdk/AppLovinSdk.java
defpackage/cza.java
com/safedk/android/internal/d.java
com/intentsoftware/addapptr/AATKitImpression.java
com/safedk/android/analytics/brandsafety/creatives/discoveries/c.java
com/applovin/mediation/ads/MaxInterstitialAd.java
com/mngads/sdk/perf/view/MNGInAppWebView.java
com/safedk/android/utils/PersistentConcurrentHashMap.java
com/applovin/sdk/AppLovinWebViewActivity.java
com/smartadserver/android/library/mediation/SASMediationAdapter.java
defpackage/bi.java
com/applovin/mediation/nativeAds/MaxNativeAdLoader.java
com/batch/android/BatchPushJobService.java
com/safedk/android/analytics/brandsafety/g.java
com/applovin/mediation/ads/MaxAdView.java
defpackage/cx.java
com/applovin/mediation/ads/MaxRewardedInterstitialAd.java
com/vungle/warren/model/Cookie.java
com/smartadserver/android/library/ui/SASNativeVideoControlsLayer.java
defpackage/df.java
com/smartadserver/android/coresdk/util/SCSConstants.java
defpackage/cl.java
com/safedk/android/analytics/brandsafety/BannerFinder.java
com/mngads/sdk/perf/vast/util/MAdvertiseVerification.java
com/applovin/impl/sdk/m.java
com/vungle/warren/log/LogSender.java
com/ogury/ed/internal/fr.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/softissimo/reverso/context/activity/CTXFlashcardsInfoActivity.java
net/pubnative/lite/sdk/mraid/nativefeature/MRAIDNativeFeatureProvider.java
com/appnexus/opensdk/MRAIDImplementation.java
defpackage/ecu.java
net/pubnative/lite/sdk/vpaid/utils/FileUtils.java
com/softissimo/reverso/context/activity/CTXFavoritesActivity.java
com/softissimo/reverso/context/activity/CTXHistoryActivity.java
defpackage/ean.java
defpackage/fyo.java
com/vungle/warren/VungleApiClient.java
com/safedk/android/utils/b.java
com/softissimo/reverso/context/activity/CTXRecordActivity.java
com/vungle/warren/persistence/CacheManager.java
com/intentsoftware/addapptr/mraid/nativefeature/MRAIDNativeFeatureProvider.java
com/vungle/warren/persistence/Repository.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 defpackage/eep.java
com/batch/android/f/a.java
defpackage/dcu.java
com/adcolony/sdk/u0.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/theartofdev/edmodo/cropper/CropImageActivity.java
com/amazon/device/ads/WebResourceService.java
com/amazon/device/ads/DTBMetricsConfiguration.java
defpackage/ext.java
defpackage/dcv.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/appnexus/opensdk/utils/HashingFunctions.java
com/batch/android/f/n.java
defpackage/bvq.java
com/softissimo/reverso/context/activity/CTXLoginWithReversoActivity.java
net/pubnative/lite/sdk/utils/PNCrypto.java
com/safedk/android/analytics/a.java
com/smaato/sdk/core/resourceloader/Md5Digester.java
com/ogury/ed/internal/ew.java
com/safedk/android/analytics/brandsafety/BrandSafetyUtils.java
Low
CVSS:0
This App uses SQL Cipher. SQLCipher provides 256-bit AES encryption to sqlite database files.
MASVS: MSTG-CRYPTO-1
Files:
 net/sqlcipher/database/SupportHelper.java
defpackage/eok.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 defpackage/btq.java
defpackage/fkz.java
com/softissimo/reverso/context/adapter/CTXFlashcardQuizRecyclerAdapter.java
defpackage/dia.java
com/intentsoftware/addapptr/internal/ad/VASTAd.java
com/safedk/android/analytics/brandsafety/BrandSafetyUtils.java
com/smartadserver/android/coresdk/components/trackingeventmanager/SCSViewabilityTrackingEventManager.java
com/smaato/sdk/video/utils/RandomUtils.java
defpackage/flb.java
net/pubnative/lite/sdk/interstitial/HyBidInterstitialBroadcastReceiver.java
com/applovin/impl/a/l.java
defpackage/dgl.java
defpackage/esb.java
com/yoc/visx/sdk/adview/modal/VisxLandingPageModal.java
com/smartadserver/android/coresdk/components/remotelogger/SCSRemoteLogger.java
defpackage/dyv.java
defpackage/fky.java
net/pubnative/lite/sdk/views/CloseableContainer.java
defpackage/fxw.java
com/batch/android/f/o0.java
com/mngads/util/MNGUtils.java
net/pubnative/lite/sdk/vpaid/macros/GenericMacros.java
defpackage/bsw.java
defpackage/did.java
net/pubnative/lite/sdk/rewarded/HyBidRewardedBroadcastReceiver.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 defpackage/eon.java
com/batch/android/b/a.java
defpackage/eid.java
com/batch/android/i/a.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 defpackage/$$Lambda$bhv$PNquRmWgQxSBbIOTO_7hrZ2JB1s.java
com/batch/android/b1/a.java
com/adcolony/sdk/l.java
com/batch/android/c1/b.java
net/sqlcipher/database/SQLiteDatabase.java
com/vungle/warren/persistence/DatabaseHelper.java
com/batch/android/q/c.java
com/batch/android/s/c.java
com/adcolony/sdk/m.java
com/batch/android/c1/f.java
com/batch/android/q/d.java
defpackage/eoj.java
defpackage/bhv.java
com/adcolony/sdk/k.java
defpackage/bht.java
com/vungle/warren/persistence/Repository.java
com/batch/android/s/b.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 com/adcolony/sdk/w0.java
com/softissimo/reverso/context/activity/CTXTranslationWebView.java
defpackage/eza.java
com/batch/android/g0/e.java
net/pubnative/lite/sdk/vpaid/VideoAdControllerVpaid.java
com/smartadserver/android/library/ui/SASWebView.java
com/amazon/device/ads/DTBAdView.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 defpackage/cxx.java
High
CVSS:5.4
Remote WebView debugging is enabled.
MASVS: MSTG-RESILIENCE-2
CWE-919 - Weaknesses in Mobile Applications
M1: Improper Platform Usage
Files:
 defpackage/ecu.java
defpackage/eyh.java
com/amazon/device/ads/DTBAdView.java
com/safedk/android/internal/SafeDKWebAppInterface.java
High
CVSS:7.4
The App uses the encryption mode CBC with PKCS5/PKCS7 padding. This configuration is vulnerable to padding oracle attacks.
MASVS: MSTG-CRYPTO-3
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
M5: Insufficient Cryptography
Files:
 com/feedad/android/min/p0.java
defpackage/buk.java
defpackage/bci.java
Low
CVSS:3.9
App can write to App Directory. Sensitive Information should be encrypted.
MASVS: MSTG-STORAGE-14
CWE-276 Incorrect Default Permissions
Files:
 com/ogury/cm/internal/aabba.java
com/ogury/sdk/internal/j.java
com/ogury/cm/internal/accaa.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 defpackage/bdn.java
com/smaato/sdk/core/dns/DiDns.java
com/smaato/sdk/dns/DnsLookupImpl.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 defpackage/ets.java
defpackage/elr.java
Low
CVSS:0
This app listens to Clipboard changes. Some malware also listen to Clipboard changes.
MASVS: MSTG-PLATFORM-4
Files:
 com/softissimo/reverso/context/local_notifications/CTXClipboardTranslationService.java
Pygal Belgium: 100 Czech Republic: 100 Germany: 1500 Spain: 200 France: 2800 Ireland: 400 Netherlands: 600 Poland: 100 Romania: 100 Russian Federation: 100 Singapore: 100 United States: 5500

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Base config is insecurely configured to permit clear text traffic to all domains.
Scope: ['*']
Medium Base config is configured to trust system certificates.
Scope: ['*']

Domains analysis

Information computed with MobSF.

US player.vimeo.com 162.159.128.61
US webview.unityads.unity3d.com 23.48.23.6
FR mobile.reverso.net 54.36.69.215
FR rvr.so 176.31.230.234
US pubnative-assets.s3.amazonaws.com 52.216.205.83
FR documentation.smartadserver.com 185.86.137.46
US firebase-settings.crashlytics.com 142.250.185.99
SG soma-soma-elb-2731128.ap-southeast-1.elb.amazonaws.com 13.250.216.96
mobile-sdk-android.visx.net
FR api.reverso.net 164.132.235.71
DE ib.adnxs-simple.com 37.252.173.215
US www.applovin.com 141.193.213.20
ads-test.st.ogury.com
FR mediationsdk.smartadserverapis.com 185.86.138.107
US www.youtube.com 142.250.185.110
FR async-compound.reverso.net 5.196.254.129
FR accountv2.dev.reverso.net 51.77.161.142
IE www.samsungapps.com 54.229.93.185
US demo7106365.mockable.io 142.250.181.243
FR mobile-dictionary.preprod.reverso.net 5.196.254.136
US www.google.com 142.250.185.196
DE sdk-files.smaato.net 13.225.78.31
NL api-conjugator.reverso.net 137.117.128.162
US impact.smaato.net 52.0.242.118
FR async5.reverso.net 5.196.254.129
DE preprod.context.reverso.net 141.94.194.75
ES ads.api.vungle.com 2.21.20.163
FR dispatcher.mng-ads.com 185.60.93.204
ES api.vungle.com 2.21.20.155
DE www.amazon.com 104.75.90.57
NL backend.europe-west4gcp0.pubnative.net 35.214.227.252
DE privacy.vungle.com 104.111.232.66
US dashif.org 185.199.109.153
FR ogury.io 217.70.184.38
FR diff.smartadserver.com 185.86.139.58
US consent-form.ogury.co 108.138.7.101
RU yandex.com 5.255.255.88
DE ns.sascdn.com 2.16.186.41
NL got.pubnative.net 35.214.227.252
s-s.presage.io
IE sdk-monitoring.ogury.co 52.214.76.198
US pubnative.net 18.210.94.237
FR dictapi.reverso.net 5.196.254.134
US d.applovin.com 34.110.179.88
US xmlpull.org 74.50.61.58
FR mobile.mng-ads.com 185.60.93.204
DE mobileconfig.sascdn.com 95.101.27.36
FR bidder.criteo.com 178.250.0.165
US a.applvn.com 104.18.230.100
US www.tensorflow.org 142.250.184.238
US assets.applovin.com 34.120.175.182
NL en.wikipedia.org 91.198.174.192
US europe-west3-yoc-vis-x-sdk.cloudfunctions.net 216.239.36.54
US exoplayer.dev 185.199.110.153
DE tracking.aatkit.com 217.182.196.13
US www.w3.org 128.30.52.100
DE prebid-server.rubiconproject.com 3.65.41.66
PL reporting.aatkit.com 54.36.172.155
FR async.reverso.net 5.196.254.129
US batch.com 76.76.21.21
FR nikkud.reverso.net 5.196.254.130
FR synonyms.reverso.net 54.36.69.201
US rt.applvn.com 104.18.230.100
FR www.reverso.net 54.36.69.215
US developer.android.com 172.217.18.14
US rt.applovin.com 34.149.159.73
US consent-manager-events.ogury.io 52.222.214.54
US ads.com 199.59.243.60
FR context.reverso.net 5.196.254.133
US d.applvn.com 104.16.70.81
DE apps-dev.sascdn.com 95.101.27.15
US smartadserver.com 192.124.249.163
US adc3-launch.adcolony.com 3.234.0.110
schemas.android.com
US monetization-support.applovin.com 34.110.151.135
NL search.spotxchange.com 185.94.180.123
US context-app-2be8e.firebaseio.com 34.120.160.131
US wd.adcolony.com 34.224.47.190