Threat level
Analyzed on 2022-05-14T03:50:42.791530
MD5 | 35c4b1c7eb790f3148e84c05091d63c8 | |
SHA1 | ce2f2abfd5408ba58809f4a106877366f6a92d60 | |
SHA256 | 4f654e593bc116dbfd8fcc906d1a96638d2b6dc94ae9205538b4e87bfd24d063 | |
Size | 51.38MB |
Information computed with APKiD.
/tmp/tmptqqc6bis!classes.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 786432:27PTX/DMEg+719UUc14wlj48MVKa3wh+NGcVKjc+l9mpYMhwX8NwCPEMg/IrPE6+:kM9lUWDCDvAhToermBh485EmbfUUbw | |
Manifest | 384:h71o4NplcJaRm5UQtx7RxtyTt8Nrr4iK4aaPRbhiTgrJXHKW/ESnKZyGVwCgKq:h2… | |
classes.dex | 49152:uJOkC+ATZNK629QhcMyrIgxisW9PMWpAQrrJi+:2OZ+ATjK62LMyrMNt/if+ |
Information computed with Dexofuzzy.
APK file | 3072:dE2tupfhPT7kCJcnHZ0juuUlFlNLIT+UxV8hPt15j+mMKyRmJrgoxpg:dYkHFlSx… | |
classes.dex | 3072:dE2tupfhPT7kCJcnHZ0juuUlFlNLIT+UxV8hPt15j+mMKyRmJrgoxpg:dYkHFlSx… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup] flag is missing. The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Broadcast Receiver (com.unity.androidnotifications.UnityNotificationManager) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Broadcast Receiver (com.unity.androidnotifications.UnityNotificationRestartOnBootReceiver) is not Protected.An intent-filter exists. A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported. |
High | Service (com.google.android.play.core.assetpacks.AssetPackExtractionService) is not Protected. [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
Information computed with MobSF.
com.unity3d.player.UnityPlayerActivity |
Hosts: web3Login Schemes: unitydl:// |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application invoke platform-provided DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_RBG_EXT.2.1 FCS_RBG_EXT.2.2 |
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate. Random Bit Generation from Application |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_COP.1.1(4) | The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] . Cryptographic Operation - Keyed-Hash Message Authentication |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
FIA_X509_EXT.2.2 | When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate. X.509 Certificate Authentication |
FPT_TUD_EXT.2.1 | The application shall be distributed using the format of the platform-supported package manager. Integrity for Installation and Update |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
US | titan-hunters-default-rtdb.asia-southeast1.firebasedatabase.app | 35.186.236.207 |
Information computed with MobSF.
https://titan-hunters-default-rtdb.asia-southeast1.firebasedatabase.app Defined in Android String Resource |
Information computed with MobSF.
Information computed with Exodus-core.
GameAnalytics | https://reports.exodus-privacy.eu.org/fr/trackers/205 |
Google Firebase Analytics | https://reports.exodus-privacy.eu.org/fr/trackers/49 |
Information computed with Quark-Engine.
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Install other APKs from file |
Confidence:
|
Connect to a URL and read data from it |
Confidence:
|
Monitor data identified by a given content URI changes(SMS, MMS, etc.) |
Confidence:
|
Load class from given class name |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Put data in cursor to JSON object |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Send notification |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get calendar information |
Confidence:
|
Get the current WIFI information |
Confidence:
|
Query the IMEI number |
Confidence:
|
Check if the given file path exist |
Confidence:
|
Method reflection |
Confidence:
|
Hide the current app's icon |
Confidence:
|
Connect to the remote server through the given URL |
Confidence:
|
Query WiFi information and WiFi Mac Address |
Confidence:
|
Read file into a stream and put it into a JSON object |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Read the input stream from given URL |
Confidence:
|
Get the current WiFi MAC address |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Get specific method from other Dex files |
Confidence:
|
Check if the network is connected |
Confidence:
|
Check the active network type |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Executes the specified string Linux command |
Information computed with MobSF.