Moderate Risk

Threat level

com.cliambrown.easynoise

Easy Noise

Analyzed on 2021-11-14T07:07:37.458030

2

permissions

1

activities

1

services

3

receivers

1

domains

File sums

MD5 ca8e14bcb2bec830c780ccb683b25281
SHA1 c594a7e3b192e2d804237e89221ffca7147c9d70
SHA256 5897b4ed2ae87b3f31034a288b652e17eae98fbad58c81c24aaf033d747e4a8a
Size 5.86MB

APKiD

Information computed with APKiD.

/tmp/tmptwnclm42!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 98304:86LpG+5QDEJasHPPXcpuZUxTCRYbmyDibSeCFRj8F/6wddJ2iHfrEb:86LUQbEcZUFjDCCFm6Ic
Manifest 192:a1AWsMno3xq8+nloGr6KylyG2dS5Pxm17ybv:a1AWsMo3xq8+nloGr6K4OSm17ybv
classes.dex 98304:mfRi1RBHJspZWhOZS/yhopFJqTcYZK62LHve3+3wemFRxE:mfRYRzspZWhvLqTc…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 6144:JP5WgZxK7DNGfdfSZzjLenhiRFA3pFQs5PbAxNH8fv8lsdh:JP5ZK7DNYkLehNpdh
classes.dex 6144:JP5WgZxK7DNGfdfSZzjLenhiRFA3pFQs5PbAxNH8fv8lsdh:JP5ZK7DNYkLehNpdh

APK details

Information computed with AndroGuard and Pithus.

Package com.cliambrown.easynoise
App name Easy Noise
Version name 0.5
Version code 5
SDK 21 - 31
UAID c06dc35ac753bab1767350177efc4cad0d74a1a6
Signature Signature V1 Signature V2 Signature V3
Frosting Frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x6dff800d: Source stamp V2 X509 cert
  • 0x2146444e: Google metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 22b653d62faaf3e7ca3aa38dc74ec96a
SHA1 9ffe5f08f3e566402317f9c6b16a2379226a332a
SHA256 6388ba8dd4c9934bcdcd728890fa686e63d13a063b32edccc3026e0c19c2b4d4
Issuer Common Name: Android, Organizational Unit: Android, Organization: Google Inc., Locality: Mountain View, State/Province: California, Country: US
Not before 2021-09-19T17:44:12+00:00
Not after 2051-09-19T17:44:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. stamp-cert-sha256

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Broadcast Receiver (com.cliambrown.easynoise.OutsidePauseReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.cliambrown.easynoise.EasyNoiseWidget) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.cliambrown.easynoise.PlayerService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.cliambrown.easynoise.NotificationReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.

Main Activity

Information computed with AndroGuard.

com.cliambrown.easynoise.MainActivity

Activities

Information computed with AndroGuard.

com.cliambrown.easynoise.MainActivity

Receivers

Information computed with AndroGuard.

com.cliambrown.easynoise.OutsidePauseReceiver
com.cliambrown.easynoise.EasyNoiseWidget
com.cliambrown.easynoise.NotificationReceiver

Services

Information computed with AndroGuard.

com.cliambrown.easynoise.PlayerService

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application use no DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to no hardware resources.
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has no network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit

Code analysis

Information computed with MobSF.

High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 kotlin/collections/EmptyList.java
kotlin/random/AbstractPlatformRandom.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$4.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$1.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$6.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$3.java
kotlin/random/KotlinRandom.java
kotlin/collections/AbstractList.java
kotlin/collections/RingBuffer.java
kotlin/random/PlatformRandomKt.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$7.java
kotlin/collections/CollectionsKt__CollectionsJVMKt.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$2.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$1.java
kotlin/random/jdk8/PlatformThreadLocalRandom.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$4.java
kotlin/collections/builders/ListBuilder.java
kotlin/collections/CollectionsKt___CollectionsKt.java
kotlin/random/FallbackThreadLocalRandom.java
kotlin/collections/MovingSubList.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$2.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$3.java
kotlin/collections/CollectionsKt__MutableCollectionsJVMKt.java
kotlin/random/FallbackThreadLocalRandom$implStorage$1.java
kotlin/random/PlatformRandom.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$5.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$8.java
kotlin/collections/CollectionsKt__MutableCollectionsKt.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 kotlin/io/ConsoleKt.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 kotlin/io/path/PathsKt__PathUtilsKt.java
kotlin/io/FilesKt__UtilsKt.java
Pygal United States: 100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US github.com 140.82.121.4

URL analysis

Information computed with MobSF.

https://github.com/cliambrown/EasyNoise
Defined in com/cliambrown/easynoise/MainActivity.java

Permissions analysis

Information computed with MobSF.

High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Load external class
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Method reflection
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Method reflection
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Get system service
       com/cliambrown/easynoise/NotificationUtils.java
Inter process communication
       com/cliambrown/easynoise/MainActivity$connection$1.java
com/cliambrown/easynoise/EasyNoiseWidgetKt.java
com/cliambrown/easynoise/MainActivity.java
com/cliambrown/easynoise/EasyNoiseWidget.java
com/cliambrown/easynoise/helpers/Util.java
com/cliambrown/easynoise/OutsidePauseReceiver.java
com/cliambrown/easynoise/NotificationUtils.java
com/cliambrown/easynoise/NotificationReceiver.java
com/cliambrown/easynoise/PlayerService.java
Java reflection
       kotlin/internal/PlatformImplementations.java
kotlin/internal/PlatformImplementationsKt.java
kotlin/coroutines/jvm/internal/ModuleNameRetriever.java
kotlin/jvm/internal/Intrinsics.java
kotlin/jvm/internal/Reflection.java
kotlin/jvm/internal/ClassReference.java
kotlin/coroutines/jvm/internal/DebugMetadataKt.java
Local file i/o operations
       com/cliambrown/easynoise/EasyNoiseWidgetKt.java
com/cliambrown/easynoise/MainActivity.java
com/cliambrown/easynoise/PlayerService.java
Sending broadcast
       com/cliambrown/easynoise/MainActivity.java
com/cliambrown/easynoise/PlayerService.java
Starting activity
       com/cliambrown/easynoise/MainActivity.java
Starting service
       com/cliambrown/easynoise/MainActivity.java
com/cliambrown/easynoise/helpers/Util.java

Control flow graphs analysis

Information computed by Pithus.

The application probably gets the network connections information

The application probably plays sound

The application probably creates an accessibility service

The application probably listens accessibility events