0/62

Threat

com.sparkine.muvizedge

Muviz Edge

Analyzed on 2022-08-23T09:22:15.256832

14

permissions

21

activities

11

services

10

receivers

16

domains

File sums

MD5 bdf66962107aa4d9daf51897f6001f6b
SHA1 062e0edfac948da948ff71bcc8b3ad4fcddcb683
SHA256 4e50d17c8b18b537395f7509492d80c5d4918beda4ffa87f4b73fba9e40a5558
Size 19.51MB

APKiD

Information computed with APKiD.

/tmp/tmpdhpemokp!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.TAGS check
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 393216:R0esuY0wQ1fPFtuNaaD/+WasH0uSHiiOfYYmpjOM3j2QKv8G:RKulpFva7+Wa+0l9eYvT2h7
Manifest 384:dTJ5nyRxcKE6X41M1fcSbqUXoTmRh0ieCTynCIh5MAavQFS/TweCGg4FAFP4z+T8:…
classes.dex 98304:N2XL92ZjwtmMyiRyGZWg1sB9RC4MOhZA0Sgl:N2JYw788WrRC4MOhZA0

Dexofuzzy

Information computed with Dexofuzzy.

APK file 12288:8EA9Xk3nne5MnZOeOZisiO1oZmXZQtWjFTaM3j:VX3nne5MnZOefsV1oZmXZQtK…
classes.dex 12288:8EA9Xk3nne5MnZOeOZisiO1oZmXZQtWjFTaM3j:VX3nne5MnZOefsV1oZmXZQtK…

APK details

Information computed with AndroGuard and Pithus.

Package com.sparkine.muvizedge
App name Muviz Edge
Version name 1.6.0.1
Version code 89
SDK 21 - 31
UAID d89d7c7070f42bfd9bd73b500b46caead6a27e62
Signature Signature V1 Signature V2 Signature V3
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 a8378db5c589a9a7eaac97e2279e8a8a
SHA1 60c2ca515229da14caa5527a7b8aa86de3bee73c
SHA256 0cfb4663831a0fb8d6973aad44e221a8ba78f7f684bd0b17d3b44bec82316484
Issuer Common Name: rockz5555 OU=Droid Freedom Unit O=Droid Freedom Inc L=Unknown S=Unknown C=LK
Not before 2014-12-05T00:45:57+00:00
Not after 2044-11-27T00:45:57+00:00

Manifest analysis

Information computed with MobSF.

High Service (com.sparkine.muvizedge.service.IpcService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.sparkine.muvizedge.service.AppNotificationListener) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.sparkine.muvizedge.service.OverlayTileService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.sparkine.muvizedge.service.AODTileService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.sparkine.muvizedge.receiver.BootReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.sparkine.muvizedge.receiver.AppModifyReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.google.android.play.core.assetpacks.AssetPackExtractionService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.

Main Activity

Information computed with AndroGuard.

com.sparkine.muvizedge.activity.HomeActivity

Activities

Information computed with AndroGuard.

com.sparkine.muvizedge.activity.HomeActivity
com.sparkine.muvizedge.activity.AODActivity
com.sparkine.muvizedge.activity.DesignsActivity
com.sparkine.muvizedge.activity.EditActivity
com.sparkine.muvizedge.activity.FeedbackActivity
com.sparkine.muvizedge.activity.DefineScreenActivity
com.sparkine.muvizedge.activity.PermissionActivity
com.sparkine.muvizedge.activity.SelectSourceActivity
com.sparkine.muvizedge.activity.DimBgActivity
com.sparkine.muvizedge.activity.AODSettingsActivity
com.sparkine.muvizedge.activity.EdgeSettingsActivity
com.sparkine.muvizedge.activity.OverlaySettingsActivity
com.sparkine.muvizedge.activity.AODLightsSettingsActivity
com.sparkine.muvizedge.activity.SelectAppsActivity
com.sparkine.muvizedge.activity.ColorActivity
com.sparkine.muvizedge.activity.AODEditActivity
com.sparkine.muvizedge.activity.AddColorActivity
com.sparkine.muvizedge.activity.AODPreviewActivity
com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity
com.google.android.play.core.common.PlayCoreDialogWrapperActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.sparkine.muvizedge.receiver.BootReceiver
com.sparkine.muvizedge.receiver.AppModifyReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver

Services

Information computed with AndroGuard.

com.sparkine.muvizedge.service.AppService
com.sparkine.muvizedge.service.IpcService
com.sparkine.muvizedge.service.AppNotificationListener
com.sparkine.muvizedge.service.OverlayTileService
com.sparkine.muvizedge.service.AODTileService
com.google.android.play.core.assetpacks.AssetPackExtractionService
com.google.android.play.core.assetpacks.ExtractionForegroundService
com.google.firebase.components.ComponentDiscoveryService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService

Sample timeline

Certificate valid not before Dec. 5, 2014, 12:45 a.m.
Oldest file found in APK Aug. 19, 2022, 10:08 p.m.
Latest file found in APK Aug. 19, 2022, 10:08 p.m.
First submission on VT Aug. 21, 2022, 8:13 a.m.
Last submission on VT Aug. 22, 2022, 7:02 p.m.
Upload on Pithus Aug. 23, 2022, 9:22 a.m.
Certificate valid not after Nov. 27, 2044, 12:45 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['microphone', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(3) The application perform cryptographic signature services (generation and verification) in accordance with a specified cryptographic algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Operation - Signing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 x2/l.java
i4/s9.java
e4/l.java
d1/c.java
i4/t2.java
i4/jq1.java
i4/rc.java
n0/t.java
x3/x.java
o6/d.java
i4/i61.java
i4/kj.java
j0/j.java
i4/qf2.java
i4/t0.java
g9/r.java
f/o.java
g/a.java
i4/l5.java
a4/b.java
s5/b.java
b0/l.java
i4/d6.java
l1/c.java
i4/dn2.java
n0/v.java
i4/c4.java
x3/i.java
h1/f.java
r4/k2.java
m1/b.java
f0/g.java
i4/be.java
n5/d.java
i4/er2.java
i4/ni.java
n0/f0.java
i4/d.java
x/b.java
a4/t.java
i4/uf.java
i4/ci1.java
o7/j0.java
b0/y.java
i4/n2.java
n0/b.java
x3/f.java
i4/dg0.java
e0/f.java
i4/yd.java
n4/b5.java
g7/l.java
n4/j2.java
n4/p5.java
o7/d1.java
i4/f7.java
x3/e.java
n0/a.java
v2/b.java
i4/ri.java
z3/v.java
b7/b.java
a4/e.java
q0/c.java
r4/b.java
i8/c.java
o7/k.java
i4/pk2.java
i4/sc.java
i4/w6.java
w4/g.java
i4/s2.java
i4/dd2.java
b0/f.java
f/q.java
i4/ze.java
w1/a.java
u5/f.java
i4/n3.java
a4/r0.java
c7/c.java
i4/c9.java
d4/a.java
o1/a.java
o4/a.java
n4/n0.java
i4/na0.java
i4/pm2.java
q1/f.java
i4/gq2.java
k/f.java
h1/j.java
i4/sk2.java
i4/s1.java
i4/z4.java
i4/oj.java
f0/h.java
x3/l.java
d8/c.java
i4/g6.java
i4/qt0.java
z6/e.java
p5/a.java
i4/l4.java
x7/o0.java
h4/b.java
a8/a.java
i4/p9.java
d1/d.java
com/sparkine/muvizedge/activity/MuvizEdgeApp.java
i4/w2.java
i4/ac0.java
e0/k.java
i4/sf.java
k3/g.java
t0/c.java
x3/j.java
b1/h.java
n4/o5.java
i4/l2.java
n4/p0.java
i4/bq.java
i4/i5.java
a4/y0.java
i4/t3.java
n4/i5.java
r4/s6.java
d1/b.java
i4/i50.java
r5/d.java
n4/n5.java
i4/kg.java
f0/f.java
b0/g.java
i4/bp0.java
n4/i1.java
i4/ur1.java
a4/n0.java
i4/q4.java
i4/jr2.java
z3/d.java
b1/a.java
i4/nl.java
i4/bl2.java
i4/ij2.java
u6/k.java
i4/w70.java
g3/b.java
a4/w.java
i8/p.java
i4/jf2.java
n0/l.java
i4/l90.java
a4/g0.java
a4/z0.java
i4/qp2.java
z3/x.java
o7/a0.java
f/h.java
o2/i.java
i4/yp2.java
i4/lj2.java
f0/d.java
r0/b.java
q1/b.java
i8/q.java
g3/a.java
i4/h4.java
r4/g7.java
i4/ma.java
e4/e.java
i4/pg2.java
i4/n.java
v0/d.java
i4/y2.java
i4/z62.java
k3/d1.java
i4/ag.java
x3/t.java
i4/y1.java
i4/na.java
i4/rf.java
n4/j5.java
i4/u3.java
i4/ce2.java
z3/k0.java
i4/ol1.java
f0/e.java
h1/g.java
v1/h.java
i4/hj.java
i4/g4.java
n4/k5.java
i4/wc.java
i4/xf2.java
g0/g.java
g0/a.java
k4/g.java
q0/k.java
x3/c0.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 b7/b.java
x3/x.java
e4/a.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 i4/ac0.java
i4/qf2.java
k8/b.java
i4/lg2.java
i8/c.java
r4/z6.java
a9/b.java
k8/a.java
k8/d.java
com/sparkine/muvizedge/view/BlinkyCharacter.java
i4/gn2.java
n4/j2.java
f7/o.java
i4/vh2.java
a9/a.java
i4/th2.java
i4/p9.java
f7/n.java
b9/a.java
i3/l.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 b7/c.java
h1/j.java
High
CVSS:7.4
The App uses the encryption mode CBC with PKCS5/PKCS7 padding. This configuration is vulnerable to padding oracle attacks.
MASVS: MSTG-CRYPTO-3
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
M5: Insufficient Cryptography
Files:
 i4/aa.java
com/sparkine/muvizedge/activity/AODActivity.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 i4/tk.java
i4/r70.java
r4/z6.java
i3/l.java
i4/f9.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 i4/f51.java
r4/l.java
i8/m.java
r4/e2.java
r4/k.java
m1/a.java
r4/b.java
i4/g41.java
y8/f.java
r4/s6.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 com/sparkine/muvizedge/fragment/SettingsFragment.java
a8/j1.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 i4/hq.java
i4/np.java
i4/gm.java
c6/i1.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 n4/j5.java
h6/q.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 i4/bd0.java
Pygal United States: 1400

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US exoplayer.dev 185.199.109.153
US developers.google.com 142.250.74.206
US www.example.com 93.184.216.34
US www.sparkine.com 35.188.36.14
US firebase.google.com 142.250.185.206
US play.google.com 142.250.181.238
US goo.gl 142.250.186.78
US google.com 142.250.185.110
schemas.android.com
US developer.android.com 142.250.186.142
US googlemobileadssdk.page.link 142.250.186.161
ns.adobe.com
US www.google.com 216.58.212.164
US admob-gmats.uc.r.appspot.com 142.250.186.180
US muviz-edge.firebaseio.com 34.120.160.131
US plus.google.com 142.250.185.110

URL analysis

Information computed with MobSF.

https://developer.android.com/reference/com/google/android/play/core/assetpacks/model/AssetPackErrorCode.html#
Defined in c6/a.java
https://goo.gl/J1sWQy
Defined in n4/j2.java
http://schemas.android.com/apk/res/android
Defined in e0/k.java
https://firebase.google.com/support/privacy/init-options.
Defined in z6/e.java
https://www.sparkine.com/social/instagram
Defined in e8/a1.java
https://google.com/search?
Defined in r4/u4.java
www.google.com
https://www.google.com
Defined in r4/v4.java
https://goo.gl/NAOOOI.
https://goo.gl/NAOOOI
Defined in r4/z6.java
https://goo.gl/NAOOOI.
https://goo.gl/NAOOOI
Defined in r4/z6.java
https://firebase.google.com/support/guides/disable-analytics
Defined in r4/c2.java
https://developer.android.com/reference/com/google/android/play/core/review/model/ReviewErrorCode.html#
Defined in j6/a.java
https://plus.google.com/
Defined in a4/b1.java
https://www.sparkine.com/social/instagram
Defined in a8/t0.java
https://developer.android.com/reference/com/google/android/play/core/install/model/InstallErrorCode#
Defined in f6/a.java
https://googlemobileadssdk.page.link/admob-interstitial-policies
Defined in i4/wr0.java
https://developers.google.com/admob/android/test-ads#enable_test_devices
Defined in i4/pl1.java
https://googlemobileadssdk.page.link/admob-interstitial-policies
Defined in i4/bj0.java
https://admob-gmats.uc.r.appspot.com/
data:enabled
Defined in i4/cq.java
http://www.example.com
Defined in i4/nl.java
https://exoplayer.dev/issues/player-accessed-on-wrong-thread
Defined in i4/qf2.java
http://www.google.com
Defined in i4/t30.java
https://googlemobileadssdk.page.link/admob-interstitial-policies
Defined in i4/sx0.java
http://www.example.com
Defined in i4/vq.java
http://www.google.com
http://www.example.com
Defined in i4/xf1.java
http://www.google.com
http://www.example.com
Defined in i4/xf1.java
http://ns.adobe.com/xap/1.0/
Defined in i4/n.java
https://exoplayer.dev/issues/cleartext-not-permitted
Defined in i4/jo1.java
https://developers.google.com/admob/android/test-ads#enable_test_devices
Defined in i4/j11.java
https://googlemobileadssdk.page.link/admob-android-update-manifest
https://googlemobileadssdk.page.link/ad-manager-android-update-manifest.
Defined in i3/g2.java
https://googlemobileadssdk.page.link/admob-android-update-manifest
https://googlemobileadssdk.page.link/ad-manager-android-update-manifest.
Defined in i3/g2.java
http://play.google.com/store/apps/details?id=
Defined in i8/j.java
https://muviz-edge.firebaseio.com
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.RECORD_AUDIO record audio
Allows application to access the audio record path.
High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
High android.permission.GET_TASKS retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
High android.permission.READ_EXTERNAL_STORAGE read external storage contents
Allows an application to read from external storage.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
Low android.permission.MODIFY_AUDIO_SETTINGS change your audio settings
Allows application to modify global audio settings, such as volume and routing.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.QUERY_ALL_PACKAGES Allows query of any normal app on the device, regardless of manifest declarations.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.USE_FINGERPRINT allow use of fingerprint
This constant was deprecated in API level 28. Applications should request USE_BIOMETRIC instead.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Medium android.permission.PACKAGE_USAGE_STATS update component usage statistics
Allows the modification of collected component usage statistics. Not for use by common applications.

Tracking analysis

Information computed with Exodus-core.

Google AdMob https://reports.exodus-privacy.eu.org/fr/trackers/312
Google Firebase Analytics https://reports.exodus-privacy.eu.org/fr/trackers/49

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Check if the network is connected
Confidence:
100%
Load external class
Confidence:
100%
Query the current data network type
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Check the active network type
Confidence:
100%
Method reflection
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Load class from given class name
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Open a file from given absolute path of the file
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Send notification
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Monitor incoming call status
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Check the current active network type
Confidence:
100%
Query The ISO country code
Confidence:
100%
Check the network capabilities
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get calendar information
Confidence:
100%
Get location of the device
Confidence:
100%
Method reflection
Confidence:
100%
Hide the current app's icon
Confidence:
100%
Check if the device is in data roaming mode
Confidence:
100%
Read file into a stream and put it into a JSON object
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Connect to a URL and set request method
Confidence:
100%
Get resource file from res/raw directory
Confidence:
100%
Get specific method from other Dex files
Confidence:
80%
Start another application from current application
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Monitor data identified by a given content URI changes(SMS, MMS, etc.)
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Read file from assets directory
Confidence:
80%
Load additional DEX files dynamically

Behavior analysis

Information computed with MobSF.

Android notifications
       i4/n51.java
x3/e.java
Base64 decode
       i8/e.java
i4/d.java
i4/c9.java
b7/b.java
i4/zb1.java
e0/d.java
i4/hl1.java
r2/d.java
i4/vl0.java
i4/d9.java
i4/hu0.java
Base64 encode
       b7/b.java
i4/ov0.java
z6/k.java
i4/w01.java
k0/f.java
i4/t70.java
i4/kr1.java
i4/be1.java
i4/n5.java
e/c.java
i4/c9.java
i4/th2.java
o6/d.java
i4/sb1.java
i4/d9.java
h6/q.java
i4/gm.java
Certificate handling
       i4/ob0.java
i4/ba0.java
Content provider
       i3/g2.java
Crypto
       i4/a02.java
h4/d.java
a3/a.java
i4/vf0.java
i4/a72.java
i4/j72.java
i4/b72.java
i4/q12.java
i4/c72.java
i4/p12.java
i4/i12.java
i4/h12.java
e/d.java
i4/f72.java
i4/d72.java
i4/p22.java
i4/aa.java
i4/e72.java
i4/r72.java
i4/q72.java
i4/e32.java
y8/f.java
com/sparkine/muvizedge/activity/AODActivity.java
i4/ga0.java
Dynamic class and dexloading
       i4/na.java
i4/tr1.java
Gps location
       f/q.java
i4/qb1.java
f/h.java
Get installed applications
       i4/xv.java
i4/nl.java
i4/op.java
i4/aw.java
q0/l.java
i8/j.java
r4/z4.java
i4/xf1.java
a8/x1.java
com/sparkine/muvizedge/fragment/SettingsFragment.java
i4/vq.java
Get system service
       f2/i.java
i4/s9.java
e4/l.java
com/sparkine/muvizedge/fragment/aodscreen/Jul21Screen.java
c0/a.java
com/sparkine/muvizedge/fragment/aodscreen/Jun21Screen.java
com/sparkine/muvizedge/fragment/aodscreen/Aug21Screen.java
i4/bd0.java
i4/h70.java
com/sparkine/muvizedge/fragment/ProFragment.java
i4/ap2.java
i4/t30.java
i4/ob1.java
com/sparkine/muvizedge/service/AppService.java
com/sparkine/muvizedge/fragment/aodscreen/Oct21Screen.java
x3/e.java
n0/t.java
com/sparkine/muvizedge/fragment/aodscreen/Sep21Screen.java
com/sparkine/muvizedge/activity/HomeActivity.java
i4/mb1.java
i4/i61.java
r4/q2.java
f/h.java
y5/n.java
i4/rk.java
i4/n51.java
c2/e.java
i4/qf2.java
w1/k.java
i4/yp2.java
i4/p51.java
i4/c60.java
k3/q1.java
i4/qj.java
com/sparkine/muvizedge/fragment/aodscreen/Nov21Screen.java
i4/li1.java
i4/r70.java
i4/ju0.java
i4/zh0.java
i4/ta.java
z1/b.java
i4/dv.java
i4/i82.java
i4/bw.java
i4/k90.java
i4/y01.java
k3/r1.java
k3/b.java
i4/q10.java
i4/t10.java
i4/ah2.java
i4/ao2.java
r4/l6.java
j0/k.java
com/sparkine/muvizedge/activity/AODSettingsActivity.java
i4/v41.java
y1/a.java
k3/o1.java
g8/c.java
com/sparkine/muvizedge/fragment/aodscreen/May21Screen.java
i4/o11.java
i4/rd0.java
n4/n0.java
f2/m.java
i4/va.java
i8/o.java
z3/e0.java
r0/c.java
n5/q.java
c6/t.java
com/sparkine/muvizedge/fragment/aodscreen/DefaultScreen.java
i4/wx0.java
i4/dt0.java
b0/h.java
b8/b.java
b8/h.java
i3/j3.java
i4/o9.java
k3/c.java
com/sparkine/muvizedge/view/BlinkyCharacter.java
i4/ck.java
com/sparkine/muvizedge/fragment/AodFragment.java
i4/jf2.java
i8/j.java
b0/s.java
k/c.java
t0/a.java
com/sparkine/muvizedge/activity/AODActivity.java
i4/ep1.java
i4/cp1.java
i4/r90.java
k3/r0.java
Http connection
       i4/ni.java
i4/y6.java
s2/a.java
i4/ol1.java
i4/h7.java
i4/pb0.java
i4/v31.java
e/b.java
r4/z4.java
z6/e.java
i4/dc0.java
i4/bs1.java
c7/c.java
g3/b.java
i4/sc0.java
i4/z70.java
i4/ca0.java
i4/ra0.java
Https connection
       i4/pb0.java
i4/ca0.java
Inter process communication
       l4/b.java
i4/ps.java
c6/r.java
i4/fa.java
i4/r60.java
i4/xt0.java
i3/s1.java
n4/s0.java
d/b.java
e8/a1.java
x3/x.java
i3/c3.java
o6/d.java
i4/l00.java
i4/t00.java
a4/e0.java
h6/a.java
e8/y.java
i4/yt.java
x3/b.java
i4/iz.java
i4/z10.java
i3/e0.java
a8/x0.java
i4/cx.java
a4/v.java
k4/c.java
x3/m.java
y3/l.java
e8/p0.java
m4/a.java
h6/l.java
i4/g20.java
n4/x0.java
i4/rd0.java
i4/vd0.java
i4/vq.java
i4/zv.java
i4/wx0.java
e/c.java
i3/p2.java
i4/gc.java
t4/g.java
o4/b.java
b0/y.java
com/sparkine/muvizedge/activity/AODActivity.java
com/sparkine/muvizedge/activity/ColorActivity.java
x3/f.java
c0/a.java
b6/o.java
i4/ws.java
i4/bd0.java
i4/ec.java
a8/l0.java
i3/l1.java
x3/e.java
b0/q.java
j6/b.java
i4/n51.java
i4/gu.java
i4/o20.java
j4/a.java
i3/o0.java
f8/a.java
i4/er1.java
x2/t.java
i4/jx.java
n4/z0.java
i4/z40.java
i4/us.java
z3/a1.java
i3/h.java
i4/jr1.java
c2/c.java
i4/bv.java
r4/t5.java
i4/aw.java
d4/a.java
i4/uz.java
i4/q42.java
i4/kl1.java
i4/x00.java
a4/q0.java
b4/b.java
i4/op.java
j3/v.java
i4/eu.java
com/sparkine/muvizedge/receiver/BootReceiver.java
i4/tt.java
j6/c.java
b6/p.java
f3/a.java
i4/kl.java
i3/q0.java
h1/d.java
i4/g40.java
i4/w40.java
g4/a.java
i3/b0.java
f3/i.java
i3/s0.java
i4/h30.java
e8/a0.java
com/sparkine/muvizedge/activity/OverlaySettingsActivity.java
i4/sc0.java
i4/t30.java
a8/b1.java
a/b.java
x3/a.java
i8/l.java
i4/kt.java
x3/y.java
h6/d.java
q0/l.java
i3/x.java
i4/ta.java
f3/k.java
k3/z0.java
i4/il.java
a4/y0.java
d/c.java
b0/i.java
i4/qt.java
x2/o.java
n4/j0.java
b0/g.java
i4/d20.java
i4/ax.java
com/sparkine/muvizedge/activity/AODSettingsActivity.java
i4/h20.java
g8/c.java
i4/km.java
l/e.java
i4/bu.java
com/sparkine/muvizedge/service/a.java
e8/z.java
b1/n.java
a4/d1.java
i3/t0.java
i4/t20.java
i3/a0.java
i4/pt.java
j4/c.java
z3/a0.java
o4/e.java
i8/j.java
a4/e1.java
a8/x1.java
t4/a.java
i8/e.java
a4/w0.java
i3/z0.java
j3/n.java
k3/m1.java
c4/a.java
i3/i1.java
h6/g.java
i4/gb1.java
i4/hs1.java
i4/rw.java
i3/f1.java
g3/a.java
com/sparkine/muvizedge/fragment/EdgeFragment.java
i4/yd0.java
a4/u.java
c6/u.java
r4/l6.java
p/d.java
e8/f0.java
i4/nt.java
k3/o1.java
t4/c.java
i3/x0.java
b6/g.java
h4/f.java
i3/t2.java
i4/c50.java
d/a.java
g4/d.java
y1/b.java
r4/s2.java
i3/w0.java
com/sparkine/muvizedge/fragment/AodFragment.java
i4/s40.java
i3/d3.java
i4/c40.java
i4/y10.java
i4/zk1.java
r4/v4.java
h6/n.java
j6/h.java
n4/h0.java
i4/k30.java
i8/k.java
i4/n00.java
i4/g30.java
b/b.java
com/sparkine/muvizedge/activity/HomeActivity.java
a4/p0.java
h6/y.java
i4/u61.java
i4/r00.java
i4/st.java
k4/e.java
com/sparkine/muvizedge/activity/AODPreviewActivity.java
c2/e.java
t4/b.java
i3/e2.java
c6/m0.java
g9/r.java
a/a.java
a4/b.java
i4/ll.java
i3/m1.java
b0/l.java
i4/x10.java
com/sparkine/muvizedge/service/IpcService.java
k3/n1.java
i4/oz.java
i4/xf1.java
h8/a.java
f3/f.java
i4/y40.java
a8/q1.java
i4/t10.java
com/sparkine/muvizedge/service/AppNotificationListener.java
i3/c.java
i4/a11.java
y1/a.java
i3/u.java
a8/y0.java
i6/b.java
j3/e.java
a8/j1.java
i4/z00.java
c6/t.java
r4/a6.java
i4/gl.java
a8/t0.java
i4/nx.java
i4/lz0.java
i4/ck.java
i4/e40.java
i3/r1.java
i4/uu.java
n4/r0.java
r4/a3.java
e8/y0.java
a4/f0.java
i3/o1.java
i4/vz.java
com/sparkine/muvizedge/activity/EditActivity.java
z3/t0.java
com/sparkine/muvizedge/service/AppService.java
i4/hz.java
i3/a1.java
i3/f0.java
i4/sa.java
i4/l40.java
a4/e.java
c2/b.java
u5/e.java
i4/ts.java
com/sparkine/muvizedge/activity/AODEditActivity.java
i4/u20.java
r4/z1.java
g4/b.java
i4/t40.java
r4/u5.java
i4/bw.java
e8/m0.java
i3/c1.java
f/e.java
i4/ah2.java
h6/k.java
i4/e20.java
i4/lw.java
k3/l0.java
com/sparkine/muvizedge/fragment/SettingsFragment.java
a4/d0.java
m4/b.java
a4/r0.java
i4/j20.java
i3/b.java
o4/a.java
h3/l.java
i4/hs.java
i4/lx.java
i8/o.java
c4/d.java
i4/cv.java
i4/b30.java
d/d.java
k3/i1.java
i4/l60.java
i4/gt.java
i3/d0.java
i4/xl.java
i4/dc.java
i4/ep1.java
i4/tz.java
x3/l.java
com/sparkine/muvizedge/receiver/AppModifyReceiver.java
h8/b.java
z3/f.java
h1/c.java
i4/vt.java
i3/k.java
i3/h2.java
i4/ss.java
w1/d.java
l/a.java
l4/a.java
h6/o.java
i4/q00.java
i4/k00.java
i3/h0.java
h6/i0.java
i4/iw.java
i4/zg2.java
b1/h.java
e8/x0.java
i4/o60.java
i4/lz.java
h3/n.java
l/c.java
r4/s6.java
p/c.java
i4/qz.java
k3/a1.java
c6/h1.java
e8/w0.java
b0/m.java
i4/zj.java
j3/f.java
i4/ur1.java
a4/h0.java
i6/c.java
z3/h.java
a4/n0.java
b8/g.java
i3/i.java
h6/j0.java
g4/c.java
r4/b6.java
z3/d.java
b1/a.java
i4/w00.java
i4/p20.java
i4/wt.java
i4/nl.java
i4/vo1.java
b/a.java
h6/d0.java
i4/ul.java
i4/ls.java
i4/w10.java
i4/hu.java
a4/g0.java
i3/i0.java
a4/i0.java
b8/n.java
i3/r.java
a8/o1.java
c2/a.java
i4/kz.java
i4/at.java
f/h.java
h4/g.java
i3/d.java
a4/h.java
i3/g2.java
r4/z4.java
com/sparkine/muvizedge/activity/EdgeSettingsActivity.java
i3/p.java
i4/xv.java
b0/o.java
i4/l10.java
i4/f40.java
b0/c.java
i4/p40.java
b6/f.java
i4/v40.java
i4/qs.java
e8/b1.java
x3/d0.java
com/sparkine/muvizedge/activity/DesignsActivity.java
i4/f20.java
i3/k0.java
x/d.java
i4/ju.java
i4/nz.java
i4/ao1.java
a8/m1.java
r4/g2.java
a8/d0.java
i4/sq.java
b6/a.java
com/sparkine/muvizedge/activity/PermissionActivity.java
i4/k40.java
com/sparkine/muvizedge/activity/AddColorActivity.java
j3/a.java
i3/u1.java
k4/a.java
n4/u0.java
i4/vr1.java
i4/zt.java
c2/f.java
i4/p60.java
x3/z.java
j3/m.java
x3/c0.java
Jar url connection
       o7/d1.java
Java reflection
       f/n.java
f2/i.java
n4/g8.java
i4/s9.java
f0/i.java
i4/j92.java
h7/b.java
n4/u8.java
q7/i.java
h7/c.java
i4/ct1.java
i4/bc2.java
r4/f.java
i4/ec2.java
n4/g7.java
i4/wb.java
i4/o92.java
n0/t.java
i4/e92.java
o6/d.java
i4/i61.java
x7/k.java
n4/r8.java
q0/l.java
g9/r.java
i4/q12.java
f/o.java
w1/n.java
i4/i12.java
a4/b.java
i4/xa2.java
b1/v.java
n0/v.java
l/c.java
l7/c.java
f0/f.java
b0/g.java
j7/k.java
f0/g.java
n4/b7.java
i4/be.java
y7/q.java
i4/ni.java
n0/f0.java
i4/av0.java
i4/f60.java
i4/ci1.java
n4/r9.java
i4/vb.java
t8/a.java
b0/s.java
f2/e.java
i4/ti2.java
t8/f.java
i4/bx1.java
r1/a.java
i4/yd.java
i4/lb2.java
x7/p0.java
o7/d1.java
u8/b.java
i4/ca0.java
f/h.java
w1/k.java
j7/l.java
q0/c.java
i4/pb0.java
i4/lj2.java
j7/c.java
y8/m.java
r4/w4.java
g4/b.java
b1/y.java
u8/a.java
b0/f.java
n0/e.java
e0/i.java
n4/a9.java
i4/na.java
o1/a.java
n4/n0.java
i4/qs0.java
n4/u9.java
i4/ol1.java
f0/e.java
i4/qa2.java
k/f.java
v1/q.java
i4/ma2.java
i4/bb2.java
n4/k8.java
i4/fc2.java
g0/g.java
i4/ss1.java
g0/a.java
j7/m.java
i4/gz.java
r1/b.java
i4/ya2.java
n4/q8.java
n4/m7.java
q0/k.java
i4/sq2.java
f0/h.java
Load and manipulate dex files
       h4/c.java
Local file i/o operations
       s2/d.java
i4/n30.java
i4/np.java
i4/bd0.java
r4/w2.java
i4/rp.java
r4/t2.java
com/sparkine/muvizedge/activity/DefineScreenActivity.java
i4/up.java
r4/x2.java
b7/b.java
r4/z4.java
r4/w4.java
i4/k7.java
i4/bq.java
r4/u2.java
i4/rf1.java
r4/u5.java
i4/hb0.java
i4/qp.java
i4/tp.java
i4/ma.java
e8/e.java
r4/h2.java
i4/pp.java
com/sparkine/muvizedge/fragment/EdgeFragment.java
i4/pd1.java
i4/j11.java
e8/n.java
k3/h1.java
i4/sp.java
h3/e.java
i4/mr1.java
i4/rr1.java
f0/l.java
k3/o1.java
i8/s.java
w3/a.java
i4/na.java
com/sparkine/muvizedge/service/AODTileService.java
com/sparkine/muvizedge/service/OverlayTileService.java
r4/v2.java
r4/y2.java
x6/j.java
i4/j60.java
h1/j.java
d7/a.java
e8/d.java
k3/k0.java
f7/o.java
i8/j.java
i4/a40.java
k4/g.java
Message digest
       i4/xk.java
i4/c10.java
b7/b.java
i4/w60.java
i4/p5.java
i4/bl.java
i4/g9.java
r4/u6.java
r4/x5.java
e4/a.java
i4/r70.java
r4/z6.java
i4/f9.java
i4/n5.java
e/c.java
i4/tk.java
r4/u5.java
x3/x.java
i4/o5.java
h6/q.java
i3/l.java
i4/al.java
Query database of sms, contacts etc
       n4/b5.java
n4/i5.java
k0/e.java
Sending broadcast
       r4/z4.java
Starting activity
       i8/e.java
a8/q1.java
c0/a.java
z3/f.java
a4/u.java
i8/k.java
com/sparkine/muvizedge/activity/OverlaySettingsActivity.java
z3/t0.java
k3/o1.java
a8/l0.java
a8/b1.java
a8/m1.java
i4/rd0.java
a8/y0.java
e8/a1.java
i8/l.java
a8/d0.java
com/sparkine/muvizedge/activity/HomeActivity.java
com/sparkine/muvizedge/service/a.java
h3/l.java
com/sparkine/muvizedge/activity/PermissionActivity.java
a8/j1.java
b1/a.java
com/sparkine/muvizedge/activity/AODPreviewActivity.java
i4/n51.java
a8/t0.java
com/sparkine/muvizedge/activity/EdgeSettingsActivity.java
a8/x0.java
a4/v.java
i8/j.java
i4/c40.java
b0/c.java
a8/x1.java
com/sparkine/muvizedge/activity/ColorActivity.java
Starting service
       i8/e.java
com/sparkine/muvizedge/activity/AODPreviewActivity.java
f2/o.java
com/sparkine/muvizedge/fragment/EdgeFragment.java
h6/h.java
p/d.java
w1/d.java
y1/b.java
h6/i.java
k3/o1.java
d4/a.java
i8/j.java
com/sparkine/muvizedge/activity/AODActivity.java
c6/t.java
com/sparkine/muvizedge/activity/ColorActivity.java
Tcp socket
       i4/ac0.java
i4/y6.java
i4/vh2.java
i4/ob0.java
i4/kx1.java
i4/ba0.java
i4/bp1.java
com/airbnb/lottie/LottieAnimationView.java
i4/na0.java
Udp datagram packet
       i4/kx1.java
Udp datagram socket
       i4/kx1.java
Url connection to file/http/https/ftp/jar
       r4/z4.java
i4/bs1.java
c7/c.java
i4/sc0.java
Webview get request
       i4/bd0.java
i4/nc0.java
i4/xc0.java
Webview javascript interface
       i4/p60.java
i4/bd0.java

Control flow graphs analysis

Information computed by Pithus.

The application probably lists running applications

The application probably loads JS-capable web views

The application probably gets different information regarding the telephony capabilities

The application probably gets the location based on GPS and/or Wi-Fi

The application probably gets the network connections information

The application probably plays sound

The application probably makes OS calls

The application probably receives data over UDP protocol

The application probably sends data over HTTP/S

The application probably starts another application

The application probably gets memory and CPU information