0/50

Threat

com.truecaller

Truecaller

Analyzed on 2022-01-29T14:16:39.679018

78

permissions

189

activities

68

services

59

receivers

75

domains

File sums

MD5 b94cc8b20e35c330bd77c208e93c2d34
SHA1 9e6eb7ebac26347af8d712a945e374c44bfaba1a
SHA256 617c775412ece86ea09a63a744e4b046595f29a6b0006711748fe90094db1434
Size 58.0MB

APKiD

Information computed with APKiD.

/tmp/tmpztbk2f1q!assets/audience_network.dex
anti_vm
  • possible Build.SERIAL check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • unknown (please file detection issue!)
/tmp/tmpztbk2f1q!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • network operator name check
  • ro.kernel.qemu check
obfuscator
  • unreadable field names
  • unreadable method names
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes10.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
  • Build.BOARD check
  • SIM operator check
  • network operator name check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes11.dex
anti_vm
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.TAGS check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes12.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes13.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes14.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes15.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes16.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes17.dex
anti_vm
  • Build.MANUFACTURER check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes18.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes19.dex
anti_vm
  • Build.MANUFACTURER check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes2.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes20.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes21.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes22.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes23.dex
anti_vm
  • Build.MANUFACTURER check
  • Build.HARDWARE check
  • possible Build.SERIAL check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes24.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes3.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes4.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • SIM operator check
  • network operator name check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes5.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes6.dex
anti_vm
  • Build.MANUFACTURER check
  • Build.HARDWARE check
  • Build.TAGS check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes7.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
  • Build.HARDWARE check
  • Build.TAGS check
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes8.dex
compiler
  • dexlib 2.x
/tmp/tmpztbk2f1q!classes9.dex
anti_vm
  • Build.MANUFACTURER check
  • possible Build.SERIAL check
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 1572864:Uve8R5bxgeP3WVpr8JytD9wU3xgtyM6TLl3qvW9G2k:UveoR3goyBy8gbkNqvt
Manifest 1536:PjSTmRYWaasB6ISSOwGGGZWZY8MvyJ89e+4z2se:P4fOwGGGZWZY8MI+46se
assets/audience_network.dex 49152:vdJbEgQQTfmcGWn2awzBdjcNMsPOx8KN6kt9zR/7E:1rRn2XvQNbP8t9S
classes.dex 24576:YkdxqgbYH0aQ0gVKmCKV390QdOf2n3BlZ6yRyIY8wKSHE/:YarDCmCKV390QEfs…
classes10.dex 24576:T5qgmK82AIxsx8YAwXBaN8CcQxyeV3nSDfhgTVKWKUzNeWIiIEfpB+T0e:T5qgm…
classes11.dex 49152:/wJmQPyyhdwoDFFqoMkjQ9AcV3k2BYh3Uqm/PnakU/OmAiRM:ymQPyYNFU5V3Al…
classes12.dex 24576:POsARWTPxdDBsB0SVKV3Vp3YkfRHBSxUaJk4UlTVhCv2qzqkX/Cw:PORRWHV80S…
classes13.dex 49152:8A5+2zvbMHuyRpV3I30DlIX6nWmJIAazH:BwRpV3Y0DlIXyI5T
classes14.dex 24576:wODHYnsEJt42Vyf/Jpl0FcV3aqOEqeqyUcJi1DZqAN5:wYWs0FcV3aqOEqeqMqJ5
classes15.dex 49152:DXA8QI1MeXHKMkjQ9A9V3gaqrrxE2Wq88DIxjt7V6x:DQ8QIDKNV31qrrxE2Wq8…
classes16.dex 49152:74BxqQXuiZ3bETk/V3Uqutq9jkuCk6LqToUrOyiBEd:EyQ+8BV30tq9jkuCk6Lq…
classes17.dex 49152:u6HlKexftERT+ecV3kx/5x5qqXYJHQnTcWu8V5:9RxVuiecV3g5x5qqXYJwQWu8D
classes18.dex 24576:M4EpgWNw3YIMETbB1BuTAeoq/2rB3arsjF/HrRx9sBbwwbXy/3:nYlQV1BuTAeo…
classes19.dex 49152:/xTdZrMIa9/1G1UgjV3eYp8mWsjk9cq60u:pdZrMgBjV3+sjk9cq8
classes2.dex 24576:lw10W8wJAuolgNQEhGWnT2Kq5evGOUdxNi8kwbTXKzz1PJ:lwaW8wJAuolTmGWn…
classes20.dex 24576:TARZWHVvNyMwirETNMCB13KBQ9qXNX7jVn48V3A2BqtpqFWkLWhPLVYQ38URvuU…
classes21.dex 24576:50fLhlnfF9q8WG/YVwIPfnxlVxV3vpGrWqbtC0zwE07qKckNHdT0SmefX5ieLyZ…
classes22.dex 12288:OgTYZz7Ll/OdwSySiwN7jLKZ3+lOWx2FRhxsUKrdOaf0PbK8FIr8UWgzSDXNvuQ…
classes23.dex 24576:r6erC8kwIILzRUN1JaV3I1F174LJ3wuUFZmAcubPZo:LVkwI6zRSJaV3I1FN41Z…
classes24.dex 12288:UotMblUdOUd9qX+ZqoixZ5/PJa8O2x6p9yIDUqhDhol:5tGUdOUd9/TiT5U32
classes3.dex 24576:Gxn0R9k+frEjZMMtaGXH1UPDeNfybeJLlzS0j2ajjOukHZjL:G6Tr6ZMMlXH176…
classes4.dex 24576:7I4p8CTxJZGhEfIFaNitfKBGQBzDfa/WBD:8STxGh6I0GQB35
classes5.dex 24576:6Tc4x23Y4cg2aSewS2X+eShJi/iK0u5XOzzpHbCSAC2+A:J3Z2EEuhyi/pE+A
classes6.dex 12288:xGkt4QqibQ+5z8RbGcRyzlay4uyjO2INpI40bdxze9Sy2AIeixg4cV2GAtRYYe9…
classes7.dex 24576:G13mXjAHbLPAp/OTQS8ZweV3NvupzRHSsal7Q5Vu0UkVAV4flqGRnI0pGdqs+Vl…
classes8.dex 12288:qzgV0oGSg9zxTX6MYSwwTXz0yFMoVEPbPDa94F9WPr4S5IrVHgGP0ulwN0GgR:q…
classes9.dex 12288:yqfoFSQFHvmysbAMgNuu1DMHAyOtO+7IKuIlJ8mYlujxBsrcTQXHhT1NfGUWyi1…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 24576:02k5979QbZYCiKo7cVn/AZQTgojS+NMWecNdJb7:+YOesojS+NTZdJn
assets/audience_network.dex 3072:4AJ6Ywz8+RqIQ+S0FPJ4x+3+LHgA37qE7tV0yY8UcImqLZZZZZiecvg9171CHl8D…
classes.dex 1536:Lu2BFNhmoe+HY04AnsvTFSqfUxTOhXCP8TqzmoLkvqo8pyhOkPVsSi:zBkSYasvZ…
classes10.dex 1536:aJzcs6uQqnNugLEixn3Y8VTGpvap6jaGOZsbP6G2MC2lEWW:6zcs6jyQgL13YOT6…
classes11.dex 1536:IelSiFmTkL1AB5cg+y907RLfm/BI9c1pUB422j2ZSHB4mn:IYh0oADP9QRLfGu9a…
classes12.dex 1536:3sBalXJQMl5MVBWWLLEs//mwrd4y3ou+iSJN:wyJxrwOwSy4SkN
classes13.dex 1536:AmiKk2zZKrmh24rrxGb/sgsghIL1z49vvhPe0P:IKbVI146nPP
classes14.dex 768:ImPx2N/SRfJ2bgonqtoOY0cwXVmwXA4jCC0N2aggVtoHRHrSvndVUaaapPxt1yCM:…
classes15.dex 1536:GyA4+h7fX1ygruNzF68AesLqbd73z3d5tqGVa5Xb:G9X1ygruNHA3qRznU5Xb
classes16.dex 768:W7Cp+IgslKfE5phEjRcih8ldu2adQfZVnhVRlradgop3ZNvbby4GFe1jM3UF:W7Cp…
classes17.dex 3072:KN7FZXMFsMpa4rsAjLNA0B2WFWdjDxu0k:KNBKwIzZnrGj9u5
classes18.dex 1536:zdoVVdu8OzkfaK3ZMDDiT3Et1D3swuyeqf0dKgCM9pgiZv177E7xZmH9ZX6KFcQu…
classes19.dex 1536:U80GePrh/+zGO68V0TcJcdFbFWTabEQLkOofAlaTQt3LkNOug0TJm4:UHPtufJGd…
classes2.dex 1536:JhoS9ByZ6HR03f4xyS8BqywoBidRRy31hakFLFny9XXefknAiLzXR:JGS9By3PC8…
classes20.dex 1536:kzNR6c1doGdSk3kmND1NmMlDnPeCMKn7RY:Qx1dimk81BlDnP0KnVY
classes21.dex 1536:OdS3EC8EQDKQRo+blq1aAKX3W/W9D584JfGDZeb:LxxQXbU1tQGOdPQo
classes22.dex 1536:wtiVXwbQ6xzBNvYAP3odeZAyGvCRPpRIw3X33x7UeB:wYXwbQ65BFYOQWEUbB33x…
classes23.dex 1536:u0l4egr8vgWJ80oDjgFPviV/2d+a3P+cKh5MvNTvL5aaKrOqTyUBzja/MR90:zl4…
classes24.dex 1536:bUqSp7p0OLzZ52cv4UDVQjSEoGJG7RvnDIMRfB:oqSJzZx4UDSScwdLJRB
classes3.dex 1536:gT5n1IoRu1vIFHgPQqM/ndu4DtOd0kAbAYty6ttZS0nqEUdKBP:WRbgPdQJbAYtn…
classes4.dex 1536:krUezXpbvpoMqLXwi/iOOJOH0ntaZb9btLiWfl7KSXWP1ZXWd:krzXxynv6OqOH2…
classes5.dex 1536:nL18KCFUSZxUcrQM6GBX1oGbSnpITK0BH1iMaQIo/Fo4YickO6FnYPengDNIT4q1…
classes6.dex 1536:FieMKnABcQQ/eqzwjklqzJ4KpZkUr6hr0IUBEQkb:hdPugU3Q0hEL
classes7.dex 1536:mrNzMvjqSGJdnitS/kqhTbdcevRuNz/VE/JHpqXWEpcpz4nh3Qr/zByT4E:UWdG3…
classes8.dex 768:ZvR8UWH4A8OgG8CaCUY/i4jMesxEnhgJXbT3bolxfMSOOooy6m8rpI1mgPpAC/uz:…
classes9.dex 1536:J19eGCApabSR3kx9j2vViaP88NseLjERSmqlR3RmCUTrVA4uV8bGVq:J19eGCs3I…

APK details

Information computed with AndroGuard and Pithus.

Package com.truecaller
App name Truecaller
Version name 11.53.6
Version code 1153006
SDK 22 - 29
UAID fe6ecc7a149d802bdf66ec0198a7c89a11810547
Signature Signature V1 Signature V2 Signature V3
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 a1c7040320a529dcac9c05a857ceb2f1
SHA1 32e5e85de72305681f79774c5281b1071000f6a4
SHA256 7f986ea9df2276637b6035059943f4c8be91260df8e8a244b7966f8e439de4fb
Issuer Common Name: White Hat Hacker, Organization: White hat, Locality: Electricity, State/Province: Some-State, Country: US
Not before 2015-05-23T09:54:25+00:00
Not after 2042-10-07T09:54:25+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. com/clevertap/android/sdk/certificates/DigiCertGlobalRootCA.crt
com/clevertap/android/sdk/certificates/DigiCertSHA2SecureServerCA.crt
okhttp3/internal/publicsuffix/NOTICE
signer.crt
stamp-cert-sha256
Findings Files
Hardcoded Keystore found. assets/grs_sp.bks
assets/updatesdkcas.bks
com/google/api/client/googleapis/google.jks
res/raw/credit_trust_store.bks
res/raw/tc_pay_trust_store.bks

Manifest analysis

Information computed with MobSF.

Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Activity-Alias (com.truecaller.DialerActivityAlias) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High Activity-Alias (com.truecaller.TruecallerInitAlias) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High TaskAffinity is set for Activity
(com.truecaller.scanner.NumberScannerActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.truecaller.ui.ContactsActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.truecaller.ui.SingleActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.truecaller.whoviewedme.WhoViewedMeActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.truecaller.calling.after_call.AfterCallActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.aftercall.AfterCallPromotionActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ui.CallMeBackActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.old.ui.activities.DialogActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ui.dialogs.PremiumObtainedDialogActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.old.ui.activities.DialogBrowserActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ui.FeedbackDialogActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ui.AfterClipboardSearchActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.truecaller.deeplink.DeepLinkHandlerActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.truecaller.messaging.sharing.SharingActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High TaskAffinity is set for Activity
(com.truecaller.messaging.notifications.ClassZeroActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ui.DefaultSmsAppSendActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.messaging.smspermission.SmsPermissionActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.ads.leadgen.LeadgenActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Broadcast Receiver (com.truecaller.service.Receiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.truecaller.service.AccountsChangedReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.truecaller.service.BootReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.truecaller.service.TrueAccessibilityService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_ACCESSIBILITY_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.truecaller.service.WidgetListProvider) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.truecaller.util.CallMonitoringReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.truecaller.util.RingerModeChangedReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.truecaller.util.ScreenUnlockedBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.truecaller.callerid.callstate.TruecallerCallScreeningService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_SCREENING_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Low Service (com.truecaller.service.DialerNumberLookupService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.truecaller.permission.USE_NUMBER_SERVICE
protectionLevel: signatureOrSystem [android:exported=true]
A Service is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Service (com.truecaller.notifications.NotificationHandlerService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.truecaller.messaging.transport.sms.SmsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_SMS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.truecaller.messaging.transport.mms.MmsWapPushDeliverReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_WAP_PUSH [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.truecaller.messaging.transport.sms.NoConfirmationSmsSendService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.SEND_RESPOND_VIA_MESSAGE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.truecaller.calling.dialer.suggested_contacts.SuggestionsChooserTargetService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_CHOOSER_TARGET_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.truecaller.fcm.FcmMessageListenerService) is not Protected.An intent-filter exists.
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Service is explicitly exported.
High Broadcast Receiver (com.truecaller.fcm.DelayedPushReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.appsflyer.MultipleInstallBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INSTALL_PACKAGES [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.truecaller.analytics.InstallReferrerReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INSTALL_PACKAGES [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.truecaller.bizmon.AppUpdateReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High TaskAffinity is set for Activity
(com.truecaller.incallui.callui.InCallUIActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.incallui.callui.phoneAccount.PhoneAccountsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Service (com.truecaller.incallui.service.InCallUIService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_INCALL_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.truecaller.acs.ui.popup.AfterCallPopupActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.acs.ui.fullscreen.AfterCallScreenActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.truecaller.truepay.app.ui.scan.views.activities.MerchantActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.truecaller.truepay.UserRegistered) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.truecaller.credit.app.alarm.CreditAlarmBootReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.truecaller.insights.reminders.receiver.ReminderBootReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Activity (com.truecaller.sdk.ConfirmProfileActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.truecaller.sdk.FullScreenConfirmActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.truecaller.sdk.BottomSheetConfirmProfileActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Content Provider (com.truecaller.sdk.utils.TcInfoContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High TaskAffinity is set for Activity
(com.truecaller.voip.ui.VoipActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.voip.legacy.incall.ui.LegacyVoipActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(com.truecaller.voip.legacy.incoming.ui.LegacyIncomingVoipActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Service (com.truecaller.voip.callconnection.VoipCallConnectionService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_TELECOM_CONNECTION_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.truecaller.contextcall.ui.ContextCallAcsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Service (com.tenor.android.core.service.AaidServiceApi26) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.tenor.android.core.service.AaidServiceCompat) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.truecaller.stats.StatsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.truecaller.common.account.TruecallerAccountAuthenticatorService) is not Protected.An intent-filter exists.
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Service is explicitly exported.
High Activity (com.facebook.CustomTabActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.google.android.gms.appinvite.PreviewActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushMsgReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.truecaller.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.truecaller.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Service (com.huawei.hms.support.api.push.service.HmsMsgService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Content Provider (com.huawei.hms.support.api.push.PushProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.truecaller.permission.PUSH_PROVIDER
protectionLevel: signatureOrSystem [android:exported=true]
A Content Provider is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (2147483647)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.truecaller.ui.TruecallerInit

Hosts: @string/payments_host @string/flash_host

Schemes: http://

com.truecaller.DialerActivityAlias

Schemes: voicemail:// tel://

Mime types: vnd.android.cursor.item/phone vnd.android.cursor.item/person

com.truecaller.deeplink.DeepLinkHandlerActivity

Schemes: truecaller:// truecallersdk://

Mime types: @string/flash_mime_type @string/pay_receive_mime_type @string/pay_send_mime_type @string/pay_recharge_mime_type

com.truecaller.messaging.sharing.SharingActivity

Schemes: sms:// smsto:// mms:// mmsto://

Mime types: text/plain text/html image/gif image/png image/jpeg image/jpg video/3gpp video/mp4 video/mpeg text/vcard text/x-vcard text/directory text/directory; profile=vcard application/vnd.ms-powerpoint application/vnd.openxmlformats-officedocument.presentationml.presentation application/vnd.ms-excel application/vnd.openxmlformats-officedocument.spreadsheetml.sheet application/msword application/vnd.openxmlformats-officedocument.wordprocessingml.document application/pdf

com.truecaller.truepay.app.ui.scan.views.activities.MerchantActivity

Hosts: pay

Schemes: upi://

com.facebook.CustomTabActivity

Hosts: cct.com.truecaller

Schemes: fbconnect://

Main Activity

Information computed with AndroGuard.

com.truecaller.ui.TruecallerInit

Activities

Information computed with AndroGuard.

com.truecaller.ui.TruecallerInit
com.truecaller.scanner.NumberScannerActivity
com.truecaller.ui.ContactsActivity
com.truecaller.ui.WizardActivity
com.truecaller.ui.SingleActivity
com.truecaller.whoviewedme.WhoViewedMeActivity
com.truecaller.premium.PremiumActivity
com.truecaller.premium.PremiumDialogActivity
com.truecaller.calling.after_call.AfterCallActivity
com.truecaller.aftercall.AfterCallPromotionActivity
com.truecaller.ui.CallMeBackActivity
com.truecaller.old.ui.activities.DialogActivity
com.truecaller.ui.dialogs.PremiumObtainedDialogActivity
com.truecaller.old.ui.activities.DialogBrowserActivity
com.truecaller.ui.FeedbackDialogActivity
com.truecaller.ui.AfterClipboardSearchActivity
com.truecaller.permission.RequiredPermissionsActivity
com.truecaller.notifications.enhancing.SourcedContactListActivity
com.truecaller.ui.clicktocall.CallConfirmationActivity
com.truecaller.ui.NotificationAccessActivity
com.truecaller.deeplink.DeepLinkHandlerActivity
com.truecaller.messaging.sharing.SharingActivity
com.truecaller.search.global.GlobalSearchResultActivity
com.truecaller.messaging.newconversation.NewConversationActivity
com.truecaller.messaging.conversation.ConversationActivity
com.truecaller.messaging.groupinfo.GroupInfoActivity
com.truecaller.messaging.groupinfo.EditImGroupInfoActivity
com.truecaller.messaging.imgroupinvitation.ImGroupInvitationActivity
com.truecaller.messaging.mediaviewer.MediaViewerActivity
com.truecaller.messaging.mediamanager.MediaManagerActivity
com.truecaller.messaging.notifications.ClassZeroActivity
com.truecaller.filters.blockedevents.BlockedEventsActivity
com.truecaller.filters.blockedevents.BlockDialogActivity
com.truecaller.filters.blockedlist.BlockedListActivity
com.truecaller.ui.DefaultSmsAppSendActivity
com.truecaller.messaging.smspermission.SmsPermissionActivity
com.truecaller.messaging.defaultsms.DefaultSmsActivity
com.truecaller.calling.initiate_call.SelectPhoneAccountActivity
com.truecaller.feature_toggles.control_panel.FeaturesControlPanelActivity
com.truecaller.ads.leadgen.LeadgenActivity
com.truecaller.ui.QaOtpListActivity
com.truecaller.swish.SwishResultActivity
com.truecaller.swish.SwishInputActivity
com.truecaller.calling.recorder.CallRecordingSettingsActivity
com.truecaller.consentrefresh.ConsentRefreshActivity
com.truecaller.ads.qa.QaCampaignsActivity
com.truecaller.ads.qa.QaKeywordsActivity
com.truecaller.payments.BankingActivity
com.truecaller.placepicker.PlacePickerActivity
com.truecaller.callerid.window.CallerIdPopupQaActivity
com.truecaller.discover.list.DiscoverProfileListActivity
com.truecaller.discover.wvm.DiscoverWhoViewedMeListActivity
com.truecaller.discover.onboarding.DiscoverOnboardingActivity
com.truecaller.discover.details.DiscoverProfileDetailsActivity
com.truecaller.ui.settings.callerid.CallerIdSettingsActivity
com.truecaller.discover.DiscoverCommunityGuidelinesActivity
com.truecaller.acs.qa.AcsQaActivity
com.truecaller.details_view.qa.DetailsViewQaActivity
com.truecaller.messaging.conversation.archive.ArchiveConversationListActivity
com.truecaller.messaging.conversation.messageDetails.MessageDetailsActivity
com.google.android.gms.ads.AdActivity
com.truecaller.calling.recorder.CallRecordingOnBoardingActivity
com.truecaller.scanner.barcode.BarcodeCaptureActivity
com.truecaller.voip.contacts.ui.VoipContactsActivity
com.truecaller.util.background.qa.WorkActionStatusActivity
com.truecaller.editprofile.ui.EditProfileActivity
com.truecaller.bizmon.governmentServices.ui.activities.GovernmentServicesActivity
com.truecaller.bizmon.ui.profile.BusinessProfileOnboardingActivity
com.truecaller.bizmon.ui.profile.CreateBusinessProfileActivity
com.truecaller.bizmon.newBusiness.onboarding.ui.OnboardingActivity
com.truecaller.bizmon.newBusiness.onboarding.ui.SubCategoryActivity
com.truecaller.bizmon.newBusiness.onboarding.ui.OnboardingIntroActivity
com.truecaller.bizmon.newBusiness.onboarding.ui.OnboardingSuccessActivity
com.truecaller.bizmon.newBusiness.profile.ui.BizProfileActivity
com.truecaller.bizmon.newBusiness.profile.ui.tag.TagPickActivity
com.truecaller.bizmon.newBusiness.editAddress.ui.EditBizAddressActivity
com.truecaller.bizmon.newBusiness.awareness.ui.VerifiedBusinessAwarenessDetailsActivity
com.truecaller.incallui.callui.InCallUIActivity
com.truecaller.incallui.callui.phoneAccount.PhoneAccountsActivity
com.truecaller.acs.ui.popup.AfterCallPopupActivity
com.truecaller.acs.ui.fullscreen.AfterCallScreenActivity
com.truecaller.details_view.ui.DetailsActivity
com.truecaller.tagger.tagPicker.TaggerActivity
com.truecaller.tagger.TagPickActivity
com.truecaller.tagger.NameSuggestionActivity
com.truecaller.ads.offline.leadgen.OfflineLeadGenActivity
com.mopub.common.MoPubBrowser
com.truecaller.ads.ads.ui.CustomNativeVideoAdActivity
com.truecaller.truepay.app.ui.dashboard.views.activities.InvisibleFallbackActivity
com.truecaller.truepay.app.ui.transaction.views.activities.TransactionActivity
com.truecaller.truepay.app.ui.payments.views.activities.PaymentsActivity
com.truecaller.truepay.app.ui.dashboard.views.activities.SettingsActivity
com.truecaller.truepay.app.ui.history.views.activities.TruePayWebViewActivity
com.truecaller.truepay.app.ui.accounts.views.activities.ManageAccountsActivity
com.truecaller.truepay.app.ui.accountv2.view.activity.PayAccountActivity
com.truecaller.truepay.app.ui.transaction.views.activities.SearchTransactionActivity
com.truecaller.truepay.app.ui.registrationv2.views.PayRegistrationActivity
com.truecaller.truepay.app.ui.scan.views.activities.ScanAndPayActivity
com.truecaller.truepay.app.ui.scan.views.activities.MerchantActivity
com.truecaller.truepay.app.ui.history.views.activities.TransactionHistoryActivity
com.truecaller.truepay.app.ui.history.views.activities.HistoryActivity
com.truecaller.truepay.app.ui.registration.views.activities.AccountConnectionActivity
com.truecaller.truepay.app.ui.bankList.BankListActivity
com.truecaller.truepay.app.ui.registration.views.activities.PreRegistrationActivity
com.truecaller.truepay.app.ui.reward.views.activities.RewardActivity
com.truecaller.truepay.app.ui.reward.views.activities.UnlockedRewardDetailsActivity
com.truecaller.truepay.app.ui.expressCheckout.views.activities.ExpressPayCheckoutActivity
com.truecaller.truepay.app.ui.billfetch.view.BillReminderActivity
com.truecaller.truepay.app.ui.gold.view.PayGoldActivity
org.npci.upi.security.pinactivitycomponent.GetCredential
com.truecaller.credit.app.ui.creditweb.views.CreditWebActivity
com.truecaller.credit.app.ui.pwa.views.activities.CreditPwaActivity
com.truecaller.credit.app.ui.okyc.views.OkycAadhaarVerificationActivity
com.truecaller.credit.app.ui.onboarding.views.activities.InitialOfferActivity
com.truecaller.credit.app.ui.onboarding.views.activities.FinalOfferActivity
com.truecaller.credit.app.ui.infocollection.views.activities.InfoCollectionActivity
com.truecaller.credit.app.ui.onboarding.views.activities.OfferCalculationActivity
com.truecaller.credit.app.ui.withdrawloan.views.activities.WithdrawLoanActivity
com.truecaller.credit.app.ui.creditscorecheck.views.activities.CreditScoreCheckActivity
com.truecaller.credit.app.ui.creditscorecheck.views.activities.DisplayCreditScoreActivity
com.truecaller.credit.app.ui.withdrawloan.views.activities.LoanReviewActivity
com.truecaller.credit.app.ui.infocollection.views.activities.DocumentCaptureActivity
com.truecaller.credit.app.ui.faq.activities.CreditWebViewActivity
com.truecaller.credit.app.ui.loanhistory.views.activities.LoanHistoryActivity
com.truecaller.credit.app.ui.applicationstatus.views.ApplicationStatusActivity
com.truecaller.credit.app.ui.errors.CreditErrorHandlerActivity
com.truecaller.credit.app.ui.onboarding.views.activities.CreditOfferOtpActivity
com.truecaller.credit.app.ui.infocollection.views.activities.CreditBankStatementWebActivity
com.truecaller.credit.app.ui.infocollection.views.activities.CreditEMandateWebActivity
com.whizdm.okycverificationsdk.ui.activities.OkycVerificationActivity
com.whizdm.okycverificationsdk.ui.activities.BankStatementVerificationActivity
com.whizdm.okycverificationsdk.ui.activities.EMandateActivity
com.truecaller.insights.ui.markedimportantpage.view.MarkedImportantPageActivity
com.truecaller.insights.ui.onboarding.view.TcXImportOnboardingActivity
com.truecaller.insights.ui.financepage.view.FinanceActivity
com.truecaller.insights.ui.qa.view.InsightsQAActivity
com.truecaller.insights.ui.qa.view.PdoViewerActivity
com.truecaller.insights.ui.financepage.search.view.SearchTrxActivity
com.truecaller.insights.ui.semicard.view.WhatIsSmartSmsActivity
com.truecaller.wizard.TruecallerWizard
com.truecaller.wizard.AccessContactsActivity
com.truecaller.wizard.countries.CountyListActivity
com.truecaller.sdk.ConfirmProfileActivity
com.truecaller.sdk.FullScreenConfirmActivity
com.truecaller.sdk.BottomSheetConfirmProfileActivity
com.truecaller.flashsdk.ui.incoming.FlashActivity
com.truecaller.flashsdk.ui.send.SendActivity
com.truecaller.flashsdk.ui.onboarding.FlashOnBoardingActivity
com.truecaller.flashsdk.ui.contactselector.FlashContactSelectorActivity
com.truecaller.flashsdk.ui.whatsnew.FlashWithFriendsActivity
com.truecaller.voip.ui.VoipActivity
com.truecaller.voip.legacy.incall.ui.LegacyVoipActivity
com.truecaller.voip.legacy.incoming.ui.LegacyIncomingVoipActivity
com.truecaller.spamcategories.ui.SpamCategoriesActivity
com.truecaller.contactfeedback.presentation.ContactFeedbackActivity
com.truecaller.contextcall.ui.ContextCallActivity
com.truecaller.contextcall.ui.ContextCallAcsActivity
com.truecaller.contextcall.ui.managecallreasons.ManageCallReasonsActivity
com.truecaller.contextcall.ui.hiddencontacts.HiddenContactsActivity
com.truecaller.forcedupdate.ui.ForcedUpdateActivity
com.truecaller.tcpermissions.AccessContactsActivity
com.truecaller.tcpermissions.TcPermissionsHandlerActivity
com.truecaller.tcpermissions.RoleRequesterActivity
com.truecaller.stats.StatsActivity
com.facebook.FacebookActivity
com.clevertap.android.sdk.InAppNotificationActivity
com.truecaller.social_login.facebook.FacebookLoginActivity
com.truecaller.social_login.google.GoogleLoginActivity
com.truecaller.suspension.ui.SuspensionActivity
com.mopub.mobileads.MoPubActivity
com.mopub.mobileads.MoPubFullscreenActivity
com.mopub.mobileads.MraidVideoPlayerActivity
com.mopub.common.privacy.ConsentDialogActivity
com.clevertap.android.sdk.CTInboxActivity
com.google.android.libraries.places.widget.AutocompleteActivity
com.facebook.CustomTabMainActivity
com.facebook.CustomTabActivity
com.google.android.gms.auth.api.signin.internal.SignInHubActivity
com.google.android.gms.appinvite.PreviewActivity
com.facebook.ads.AudienceNetworkActivity
com.google.android.gms.common.api.GoogleApiActivity
com.android.billingclient.api.ProxyBillingActivity
com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity
com.google.android.play.core.common.PlayCoreDialogWrapperActivity
com.inmobi.ads.rendering.InMobiAdActivity
com.huawei.hms.activity.BridgeActivity
com.huawei.hms.activity.EnableServiceActivity
com.huawei.updatesdk.service.otaupdate.AppUpdateActivity
com.huawei.updatesdk.support.pm.PackageInstallerActivity

Receivers

Information computed with AndroGuard.

com.truecaller.service.Receiver
com.truecaller.service.AccountsChangedReceiver
com.truecaller.service.BootReceiver
com.truecaller.service.AlarmReceiver
com.truecaller.service.WidgetListProvider
com.truecaller.util.CallMonitoringReceiver
com.truecaller.util.RingerModeChangedReceiver
com.truecaller.util.ScreenUnlockedBroadcastReceiver
com.truecaller.messaging.transport.sms.SmsReceiver
com.truecaller.messaging.transport.mms.MmsWapPushDeliverReceiver
com.truecaller.messaging.transport.mms.MmsStatusReceiver
com.truecaller.messaging.notifications.NotificationBroadcastReceiver
com.truecaller.messaging.transport.DelayedMessageReceiver
com.truecaller.fcm.DelayedPushReceiver
com.appsflyer.MultipleInstallBroadcastReceiver
com.truecaller.analytics.InstallReferrerReceiver
com.truecaller.calling.notifications.CallingNotificationsBroadcastReceiver
com.truecaller.analytics.ChosenComponentReceiver
com.truecaller.notifications.MissedCallsNotificationActionReceiver
com.truecaller.calling.missedcallreminder.MissedCallReminderNotificationReceiver
com.truecaller.presence.PresenceSchedulerReceiver
com.truecaller.notifications.AnalyticsNotificationReceiver
com.truecaller.messaging.transport.im.JoinedImUsersBroadcastReceiver
com.truecaller.messaging.notifications.ReactionBroadcastReceiver
com.truecaller.messaging.transport.im.ImUnreadRemindersBroadcastReceiver
com.truecaller.ui.dialogs.TracingBroadcastReceiver
com.truecaller.bizmon.AppUpdateReceiver
com.truecaller.truepay.app.fcm.NotificationBroadcastReceiver
com.truecaller.truepay.UserRegistered
com.truecaller.credit.app.notifications.CreditNotificationBroadcastReceiver
com.truecaller.credit.app.alarm.CreditAlarmBootReceiver
com.truecaller.credit.app.alarm.CreditAlarmSMSReceiver
com.truecaller.credit.app.alarm.CreditAlarmLocReceiver
com.truecaller.insights.reminders.receiver.InsightsReminderActionReceiver
com.truecaller.insights.reminders.receiver.BillReminderReceiver
com.truecaller.insights.reminders.receiver.ReminderBootReceiver
com.truecaller.sdk.push.SdkActionReceiver
com.truecaller.flashsdk.receiver.ActionReceiver
com.truecaller.flashsdk.receiver.PhoneStateReceiver
com.truecaller.voip.notification.missed.MissedVoipCallMessageBroadcast
com.truecaller.call_alert.receive_notification.CallAlertDismissBroadcastReceiver
com.truecaller.call_alert.receive_notification.CallSilenceBroadcastReceiver
com.truecaller.stats.IntentChooserReceiver
com.clevertap.android.sdk.pushnotification.CTPushNotificationReceiver
com.truecaller.common.background.DelayedServiceBroadcastReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.facebook.CurrentAccessTokenExpirationBroadcastReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver
com.huawei.hms.support.api.push.PushMsgReceiver
com.huawei.hms.support.api.push.PushReceiver

Services

Information computed with AndroGuard.

com.truecaller.service.TrueAccessibilityService
com.truecaller.service.WidgetListService
com.truecaller.presence.PresenceService
com.truecaller.callhistory.service.CallHistoryService
com.truecaller.callerid.callstate.TruecallerCallScreeningService
com.truecaller.callerid.CallerIdService
com.truecaller.notifications.internal.InternalTruecallerNotificationsService
com.truecaller.callerid.callstate.CallStateService
com.truecaller.service.SyncPhoneBookService
com.truecaller.calling.clipboard.ClipboardService
com.truecaller.service.DialerNumberLookupService
com.truecaller.common.tag.TagService
com.truecaller.notifications.NotificationHandlerService
com.truecaller.service.MissedCallsNotificationService
com.truecaller.service.PushNotificationLoggingService
com.truecaller.service.CallMeBackNotificationService
com.truecaller.referral.ReferralNotificationService
com.truecaller.notifications.GenericWebViewNotificationService
com.truecaller.whoviewedme.ReceiveProfileViewService
com.truecaller.whoviewedme.GenerateProfileViewService
com.truecaller.premium.PremiumNotificationService
com.truecaller.notifications.OTPCopierService
com.truecaller.messaging.data.MessagesDataService
com.truecaller.filters.FilterManagerService
com.truecaller.messaging.transport.sms.NoConfirmationSmsSendService
com.truecaller.messaging.transport.SendMessageService
com.truecaller.messaging.transport.SendImService
com.truecaller.messaging.transport.mms.MmsService
com.truecaller.calling.dialer.suggested_contacts.SuggestionsChooserTargetService
com.truecaller.messaging.transport.im.ImSubscriptionService
com.truecaller.fcm.FcmMessageListenerService
com.truecaller.push.HuaweiMessageService
com.truecaller.backup.RestoreService
com.truecaller.service.contact.RefreshContactIndexingService
com.truecaller.calling.recorder.floatingbutton.BubblesService
com.truecaller.incallui.service.InCallUIService
org.npci.upi.security.pinactivitycomponent.CLRemoteServiceImpl
com.truecaller.sdk.ConfirmProfileService
com.truecaller.flashsdk.core.KidFlashService
com.truecaller.flashsdk.core.FlashMediaService
com.truecaller.flashsdk.assist.FetchAddressIntentService
com.truecaller.voip.service.call.CallService
com.truecaller.voip.service.invitation.InvitationService
com.truecaller.voip.legacy.incall.LegacyVoipService
com.truecaller.voip.legacy.incoming.LegacyIncomingVoipService
com.truecaller.voip.callconnection.VoipCallConnectionService
com.tenor.android.core.service.AaidServiceApi26
com.tenor.android.core.service.AaidServiceCompat
com.clevertap.android.sdk.pushnotification.CTNotificationIntentService
com.truecaller.common.account.TruecallerAccountAuthenticatorService
com.truecaller.analytics.EventsTrackerService
com.clevertap.android.sdk.pushnotification.amp.CTBackgroundIntentService
com.clevertap.android.sdk.pushnotification.amp.CTBackgroundJobService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.auth.api.signin.RevocationBoundService
com.google.mlkit.common.internal.MlKitComponentDiscoveryService
com.google.firebase.messaging.FirebaseMessagingService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.android.gms.ads.AdService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
androidx.room.MultiInstanceInvalidationService
com.huawei.hms.support.api.push.service.HmsMsgService
com.huawei.agconnect.core.ServiceDiscovery

Sample timeline

Oldest file found in APK Jan. 1, 1980, midnight
Certificate valid not before May 23, 2015, 9:54 a.m.
First submission on VT March 30, 2021, 8:34 p.m.
Last submission on VT March 30, 2021, 8:34 p.m.
Latest file found in APK March 30, 2021, 11:39 p.m.
Upload on Pithus Jan. 29, 2022, 2:16 p.m.
Certificate valid not after Oct. 7, 2042, 9:54 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity', 'camera', 'location', 'bluetooth', 'microphone'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['call lists', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_CKM.1.1(3)
FCS_CKM.1.2(3)
A password/passphrase shall perform [Password-based Key Derivation Functions] in accordance with a specified cryptographic algorithm..
Password Conditioning
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA1'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/huawei/hms/opendevice/a/a.java
com/huawei/hms/support/common/ActivityMgr.java
com/huawei/hms/support/api/PendingResultImpl.java
com/huawei/hms/aaid/HmsInstanceId.java
com/huawei/hms/utils/SHA256.java
e/d/a/n/q/d/c.java
e/d/a/n/n/j.java
com/huawei/hms/aaid/plugin/PluginUtil.java
com/huawei/hms/aaid/encrypt/a.java
e/d/a/n/q/d/n.java
com/huawei/hms/update/ui/k.java
com/huawei/hms/push/RemoteMessage.java
e/d/a/r/j/d.java
com/huawei/hms/activity/a.java
com/huawei/hms/aaid/init/a.java
com/mopub/volley/toolbox/DiskBasedCache.java
com/huawei/hms/activity/internal/ForegroundInnerHeader.java
e/k/a/f/e/t.java
e/d/a/n/n/l.java
k2/o/a/a.java
e/d/a/n/q/d/b0.java
com/huawei/hms/utils/countrycode/CountryCodeBean.java
e/k/a/f/l/a/s7.java
com/huawei/hms/update/ui/g.java
com/huawei/hms/common/internal/HuaweiApiManager.java
in/org/npci/commonlibrary/e.java
e/d/a/n/p/f.java
e/d/a/n/p/s.java
com/huawei/hms/push/HmsMessageService.java
e/d/a/n/q/d/l.java
com/mopub/volley/toolbox/ImageRequest.java
e/d/a/l/e.java
e/k/d/y/s.java
com/huawei/hms/api/HuaweiApiClient.java
com/huawei/hms/push/ups/UPSService.java
e/d/a/t/k/a.java
e/k/d/u/f.java
k2/p/a/p.java
e/d/a/r/i.java
com/huawei/hms/activity/BridgeActivity.java
com/huawei/hms/utils/Util.java
com/huawei/hms/update/b/b.java
e/d/a/n/o/i.java
com/mopub/mraid/MraidController.java
e/d/a/n/q/d/j.java
com/huawei/hms/common/HuaweiApi.java
e/c/d/a/a.java
com/huawei/hms/push/utils/e.java
com/huawei/hms/aaid/b/a.java
com/huawei/hms/framework/common/Logger.java
e/k/d/u/a0.java
e/d/a/n/p/d.java
e/k/d/y/p.java
com/huawei/hms/support/api/push/b/c/a.java
e/d/a/o/o.java
com/huawei/hms/api/IPCTransport.java
com/huawei/hms/support/api/push/PushReceiver.java
com/huawei/hms/utils/UIUtil.java
e/d/a/l/d.java
com/huawei/hms/update/ui/e.java
com/huawei/hms/support/api/client/ResolvingResultCallbacks.java
com/huawei/hms/utils/IOUtils.java
com/mopub/volley/toolbox/BasicNetwork.java
com/huawei/hms/push/a/c.java
com/nyb/a/a/a.java
org/json/Test.java
com/mopub/volley/CacheDispatcher.java
com/huawei/hms/adapter/AvailableAdapter.java
e/k/a/f/e/o.java
e/k/a/f/e/c.java
com/huawei/hms/utils/a/a.java
e/c/f/w.java
com/huawei/hms/utils/FileUtil.java
e/k/d/u/b.java
com/huawei/hms/support/api/push/PushMsgReceiver.java
com/huawei/hms/update/ui/l.java
com/huawei/hms/support/hianalytics/HiAnalyticsUtil.java
com/huawei/hms/update/ui/f.java
e/a/c0/a/o1.java
com/huawei/hms/ui/AbstractDialog.java
com/mopub/common/MoPub.java
e/d/a/n/o/a0.java
com/huawei/hms/common/util/a.java
com/huawei/hms/push/HmsMessaging.java
com/huawei/hms/support/api/push/b/a.java
com/huawei/hms/support/api/ErrorResultImpl.java
com/mopub/common/SdkConfiguration.java
com/huawei/hms/support/hianalytics/HiAnalyticsUtils.java
com/mopub/mobileads/dfp/adapters/MoPubAdapter.java
com/huawei/hms/utils/HMSBIInitializer.java
e/d/a/n/q/h/a.java
com/huawei/hms/support/api/safetydetect/callback/AbstractTaskApiCall.java
com/huawei/hms/common/internal/RequestHeader.java
e/k/a/f/e/f.java
com/huawei/hms/android/SystemUtils.java
com/huawei/hms/update/manager/a.java
com/huawei/hms/opendevice/OpenDeviceTaskApiCall.java
e/d/a/n/q/d/o.java
com/huawei/hms/common/internal/ConnectionErrorMessages.java
com/huawei/hms/support/api/core/ConnectService.java
e/d/a/m/a/b.java
com/huawei/hms/push/utils/JsonUtil.java
e/k/d/n/e/b.java
com/huawei/hms/aaid/encrypt/b.java
e/d/a/n/p/t.java
r2/p0/l/h.java
e/k/d/u/i.java
e/k/d/u/v.java
e/d/a/n/o/j.java
e/k/d/y/c0.java
e/k/a/f/f/a/a/h0.java
com/huawei/hms/support/api/push/PushProvider.java
e/d/a/n/q/d/z.java
com/huawei/hms/update/ui/h.java
zr/arsdd/vvxxds/qwaszxc.java
k2/i/a/u.java
k2/g/b/d.java
e/k/d/u/x.java
com/huawei/hms/update/manager/UpdateManager.java
com/huawei/hms/aaid/init/AutoInitHelper.java
com/huawei/hms/update/a/b.java
com/huawei/hms/utils/JsonUtil.java
com/huawei/hms/utils/HMSPackageManager.java
com/huawei/hms/opendevice/a/d.java
e/k/d/y/b0.java
e/k/d/y/g.java
r2/p0/l/i/d.java
in/org/npci/commonlibrary/k.java
com/huawei/hms/common/internal/BaseHmsClient.java
e/d/a/n/q/a.java
com/huawei/hms/aaid/b/d.java
e/d/a/r/j/l.java
com/huawei/hms/aaid/a/c.java
o2/b/a/c.java
k2/v/e/k.java
e/d/a/n/o/b0/j.java
com/huawei/hms/update/a/d.java
com/huawei/hms/aaid/init/b.java
com/huawei/hms/support/api/push/c/a/b.java
t2/a/a/d.java
k2/d0/y.java
com/mopub/volley/NetworkDispatcher.java
com/mopub/volley/VolleyLog.java
com/huawei/hms/push/utils/DateUtil.java
com/huawei/hms/push/a/a.java
e/c/f/x/h.java
com/huawei/hms/support/api/opendevice/HuaweiOpendeviceApiImpl.java
com/huawei/hms/utils/PackageManagerHelper.java
com/huawei/hms/common/data/DataHolder.java
com/huawei/hms/adapter/BinderAdapter.java
e/d/a/n/o/l.java
com/truecaller/ads/leadgen/LeadgenHeaderLayout.java
com/nyb/a/a/k.java
com/huawei/hms/update/ui/a.java
e/k/a/f/e/m.java
e/d/a/n/n/b.java
e/k/a/f/f/a/a/u0.java
com/huawei/hms/update/b/f.java
e/d/a/n/p/c.java
k2/v/e/b.java
e/k/d/y/c.java
e/d/a/n/n/o/b.java
e/d/a/h.java
k2/v/e/f0.java
com/huawei/hms/support/api/push/b/d/a.java
e/d/a/n/o/c0/j.java
e/k/d/u/d0.java
com/mopub/volley/toolbox/HttpHeaderParser.java
com/huawei/hms/support/api/push/b/b/a.java
com/huawei/hms/support/api/push/b/a/a.java
com/huawei/hms/adapter/ui/BaseResolutionAdapter.java
e/a/k4/s0.java
com/huawei/hms/api/HuaweiMobileServicesUtil.java
com/truecaller/voip/notification/missed/MissedVoipCallsWorker.java
com/huawei/hms/common/api/AvailabilityException.java
e/d/a/o/l.java
com/mopub/network/MultiAdResponse.java
com/huawei/hms/update/ui/b.java
com/huawei/hms/api/ResolutionDelegate.java
com/huawei/hms/support/api/push/a/a.java
com/huawei/hms/support/api/push/c/a.java
com/huawei/hms/common/util/AGCUtils.java
com/huawei/hms/support/api/push/b/c/c.java
com/huawei/hms/common/internal/HmsClient.java
e/k/a/f/f/a/a/k.java
com/huawei/hms/aaid/a/b.java
com/huawei/hms/support/api/push/service/HmsMsgService.java
e/g/a/a/c/a.java
e/d/a/n/o/b0/i.java
com/huawei/hms/adapter/ui/UpdateAdapter.java
com/huawei/hms/support/log/HMSDebugger.java
e/d/a/o/e.java
com/huawei/hms/support/api/client/ResultCallbacks.java
e/d/a/o/k.java
com/mopub/common/privacy/MoPubIdentifier.java
com/huawei/hms/adapter/BaseAdapter.java
com/bumptech/glide/GeneratedAppGlideModuleImpl.java
in/org/npci/commonlibrary/a/b.java
com/huawei/hms/common/internal/ResponseHeader.java
com/huawei/hms/api/b.java
com/mopub/volley/toolbox/JsonRequest.java
com/huawei/hms/support/api/push/b/c/d.java
e/d/a/n/q/d/s.java
e/k/a/f/l/a/v7.java
e/d/a/c.java
com/huawei/hms/api/BindingFailedResolution.java
e/d/a/n/o/d0/a.java
e/k/d/u/w.java
com/tenor/android/core/util/AbstractLogUtils.java
e/d/a/n/q/h/j.java
r2/p0/c.java
e/d/a/n/q/h/d.java
com/huawei/hms/api/HuaweiApiClientImpl.java
com/huawei/hms/api/IPCCallback.java
com/huawei/hms/push/utils/a.java
e/d/a/i.java
e/d/a/n/o/c0/e.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 e/a/i/w/c.java
e/a/b0/r0/m/f0.java
e/a/b0/r0/e.java
e/a/b0/r0/m/w0.java
e/a/b0/s0/m.java
e/a/b0/s0/b.java
e/a/b0/r0/m/v.java
e/a/b0/h0.java
e/a/b0/r0/m/i0.java
e/a/b0/r0/d.java
e/k/a/b/j/t/i/x.java
e/a/b0/r0/m/q0.java
e/a/b0/r0/m/t0.java
e/a/b0/r0/m/w.java
e/a/b0/s0/a.java
e/a/b0/s0/n.java
e/a/b0/r0/m/j.java
e/a/b0/s.java
e/a/b0/s0/x.java
org/npci/upi/security/pinactivitycomponent/i.java
e/a/b0/s0/c.java
e/a/b0/r0/m/z0.java
e/a/l/x0.java
e/a/b0/r0/m/i.java
e/a/b0/r0/g.java
e/a/b0/s0/h0.java
e/a/b0/s0/z.java
e/a/b0/r0/m/x.java
e/k/a/b/j/t/i/w.java
e/a/b0/r0/m/q1.java
e/a/a/l/f/b.java
e/a/b0/r0/m/l.java
e/a/b0/r0/m/a1.java
e/a/b0/r0/m/d1.java
com/inmobi/media/gi.java
e/a/b0/r0/m/c0.java
e/k/a/b/j/t/i/z.java
e/a/b0/r0/m/m.java
e/a/b0/r0/b.java
e/a/b0/r0/m/g.java
e/a/b0/r0/m/y.java
e/a/b0/r0/m/g1.java
e/a/b0/r0/m/a.java
e/a/b0/r0/m/a0.java
e/a/b0/r0/m/s.java
e/a/b0/r0/m/k1.java
e/a/b0/s0/j.java
e/a/b0/r0/m/v0.java
e/a/b0/r0/a.java
e/a/b0/r0/m/o0.java
e/a/h0/u.java
e/a/b0/r0/m/g0.java
e/a/b0/r0/m/r1.java
e/a/b0/b.java
k2/d0/y.java
e/a/b0/h.java
e/a/b0/r0/m/n0.java
e/a/a/l/f/c.java
e/a/b0/r0/m/f1.java
e/a/b0/r0/m/l1.java
e/a/b0/s0/p.java
e/a/b0/r0/m/h0.java
e/k/a/f/l/a/r7.java
e/a/b0/r0/m/u0.java
e/a/b0/s0/v.java
e/a/b0/x.java
e/a/b0/r0/m/b1.java
e/a/b0/r0/m/m0.java
e/a/b0/r0/m/p.java
e/a/b0/r0/m/d.java
e/a/b0/r0/m/p1.java
e/a/b0/s0/h.java
e/a/b0/s0/d0.java
e/k/a/f/l/a/e.java
e/a/b0/s0/g.java
e/a/b0/r0/m/e1.java
e/a/b0/r0/m/j0.java
e/a/b0/s0/g0.java
e/a/b0/s0/t.java
e/a/b0/r0/m/m1.java
e/a/b0/r0/m/b0.java
e/a/l/o2.java
e/a/a/l/a.java
e/a/b0/a0.java
e/a/b0/r0/m/s0.java
e/a/b0/s0/u.java
e/a/b0/r0/m/h1.java
e/a/b0/r0/m/c.java
e/a/d/o/h/a.java
e/a/a/s/g/e.java
e/a/b0/r0/m/f.java
e/k/a/b/j/t/i/t.java
e/a/b0/r0/m/o.java
e/a/b0/s0/i.java
e/a/b0/r0/m/r.java
e/a/b0/r0/m/p0.java
e/a/b0/r0/m/n1.java
e/a/b0/u.java
e/a/b0/r0/l/a.java
e/a/b0/o.java
e/a/b0/r0/m/r0.java
e/a/b0/s0/e.java
e/a/d/o/h/b.java
e/a/b0/s0/w.java
e/a/b0/s0/b0.java
e/a/b0/r0/m/d0.java
e/a/b0/s0/k.java
e/a/b0/r0/m/j1.java
e/a/b0/r0/m/t.java
e/a/b0/r0/m/z.java
e/a/b0/s0/j0.java
e/a/b0/r0/m/l0.java
e/a/b0/r0/m/y0.java
e/k/a/f/l/a/v7.java
e/k/a/b/j/t/i/y.java
e/a/b0/r0/m/o1.java
e/a/b0/r0/m/c1.java
e/a/b0/r0/m/x0.java
e/a/b0/r0/m/e0.java
e/a/b0/r0/m/q.java
e/a/b0/s0/c0.java
k2/z/j.java
e/a/b0/r0/m/k.java
e/a/b0/r0/m/n.java
e/k/a/b/j/t/i/v.java
e/a/b0/r0/m/b.java
e/a/b0/r0/m/e.java
e/k/a/c/n1/k0/l.java
e/a/b0/s0/i0.java
e/a/b0/r0/m/h.java
e/a/b0/r0/m/k0.java
e/a/b0/r0/c.java
e/a/b0/r0/m/i1.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 e/a/f/a/a/d/b/b/j.java
e/a/d/a/d/b/u3.java
e/a/f/a/g/b/a0.java
com/huawei/hms/framework/network/grs/c/b/d.java
e/a/f/a/a/b/c/a/b/j.java
e/a/z3/j.java
e/a/f/a/g/b/e0.java
e/f/a/a/e2.java
r2/p0/l/g.java
r2/p0/l/d.java
com/huawei/hianalytics/ab/bc/fg/de.java
com/huawei/updatesdk/a/a/a/e.java
e/a/a/c/a/b.java
com/huawei/hms/update/b/e.java
r2/p0/l/c.java
r2/p0/l/h.java
com/inmobi/media/cl.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 e/a/t/l/c.java
e/a/y4/s1.java
com/truecaller/messaging/data/providers/AttachmentProvider.java
e/a/k/b/l0.java
e/a/c3/a/c.java
e/a/b/g/a/j1.java
com/whizdm/okycverificationsdk/util/HttpUtilKt.java
e/a/b/c/a0.java
e/a/b/c/l.java
com/truecaller/ui/view/AfterCallButtons.java
e/a/g0/g/l.java
e/a/x/b/i.java
e/a/z4/p.java
com/huawei/hms/update/a/d.java
io/agora/rtm/internal/AgoraSysUtils.java
e/a/k/b/c2.java
e/a/y4/s0.java
e/a/w2/a.java
e/a/z4/o.java
e/a/b/g/a/e3/c.java
e/a/k/b/f2.java
e/a/f/a/i/q.java
e/a/a/t/c.java
io/agora/rtc/internal/CommonUtility.java
e/a/k/b/p1.java
High
CVSS:0
This App may request root (Super User) privileges.
MASVS: MSTG-RESILIENCE-1
CWE-250 Execution with Unnecessary Privileges
Files:
 e/a/z4/x.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/huawei/hms/opendevice/a/d.java
k2/d0/y.java
com/inmobi/media/hc.java
e/o/a/e.java
com/huawei/hianalytics/ab/bc/ab/gh.java
e/f/a/a/p2/f/b.java
com/appsflyer/internal/z.java
com/mopub/common/util/Utils.java
com/huawei/hianalytics/ab/bc/ab/cd.java
e/f/a/a/m2/g/c.java
e/k/d/w/r/b.java
e/k/d/n/e/k/g.java
e/k/d/u/n.java
Low
CVSS:3.9
App can write to App Directory. Sensitive Information should be encrypted.
MASVS: MSTG-STORAGE-14
CWE-276 Incorrect Default Permissions
Files:
 e/a/q/d/a.java
e/a/o4/d.java
e/a/t3/l.java
e/a/j/j3/h1.java
e/a/y/v.java
e/a/c/b0/f0.java
e/a/y4/y2/d.java
e/a/g/f/a1.java
com/truecaller/android/sdk/clients/callVerification/RequestPermissionHandler.java
e/a/a/r/b.java
e/a/v4/c.java
e/a/h3/b.java
e/a/e4/e.java
e/a/o4/f.java
e/a/a5/r0.java
e/a/f/a/g/b/p.java
e/a/a2.java
e/a/f/a/a/b/c/a/b/k.java
e/a/l3/i.java
e/a/e/q/r.java
e/a/j/u2.java
e/a/g0/a/j.java
e/a/m/n/d/d.java
e/a/m/b/g/f.java
e/a/w/o.java
e/a/k/b/k1.java
e/a/l2/r.java
e/a/t3/f.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 org/npci/upi/security/pinactivitycomponent/CLConstants.java
e/d/a/n/h.java
com/huawei/hms/push/constant/RemoteMessageConst.java
com/inmobi/media/ao.java
com/huawei/hms/support/api/push/PushReceiver.java
com/huawei/updatesdk/service/appmgr/bean/a.java
e/d/a/n/o/q.java
com/mopub/common/MoPubBrowser.java
com/appsflyer/CreateOneLinkHttpTask.java
com/inmobi/media/ev.java
m2/a/k1/e.java
k2/d/a/b.java
com/mopub/common/GpsHelper.java
com/truecaller/abtest/definitions/Constants.java
com/mopub/common/Constants.java
com/appsflyer/AppsFlyerProperties.java
com/truecaller/android/sdk/TrueException.java
com/huawei/hms/support/hianalytics/HiAnalyticsConstant.java
com/mopub/mobileads/BaseVideoPlayerActivity.java
com/mopub/common/DataKeys.java
com/truecaller/android/sdk/PartnerInformation.java
com/huawei/hms/framework/common/hianalytics/HianalyticsBaseData.java
com/huawei/hms/aaid/constant/AaidIdConstant.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 e/a/u3/f.java
q2/a/a/f/a.java
e/a/c0/a/f2.java
n2/s/g.java
com/truecaller/flashsdk/models/Flash.java
in/org/npci/commonlibrary/e.java
m2/a/j1/j2.java
q2/a/a/b.java
e/a/f/a/h/b.java
com/inmobi/media/ai.java
n2/s/b0.java
m2/a/n1/a.java
n2/b0/a.java
n2/s/f.java
e/a/b/g/a/j1.java
e/k/a/c/n1/k0/s.java
m2/a/k1/f.java
t2/e/a/a/a/f.java
com/truecaller/truepay/app/fcm/TruepayFcmManager.java
n2/s/p.java
n2/s/c.java
e/h/i.java
e/k/d/z/k/d.java
m2/a/j1/f0.java
s2/s.java
q2/a/a/a.java
q2/a/a/f/b.java
e/a/d0/f0/f.java
e/f/a/a/v0.java
t2/c/f/b.java
n2/b0/b.java
n2/s/h.java
e/k/d/n/e/m/w.java
e/k/d/b0/o.java
e/k/d/b0/q/k.java
com/appsflyer/internal/d.java
com/inmobi/media/av.java
q2/a/a/c/c.java
e/a/c0/a/u1.java
e/a/z/x.java
e/a/x/a/j/f/e.java
e/k/a/c/n1/k0/l.java
k2/v/b/a/s0/j.java
k2/v/b/a/s0/j0.java
m2/a/j1/e0.java
t2/e/a/a/a/g.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 com/mopub/mobileads/dfp/adapters/BuildConfig.java
com/huawei/hms/support/api/PendingResultImpl.java
com/huawei/hianalytics/ab/ef/cd.java
com/nyb/a/a/h.java
com/huawei/hms/support/hianalytics/HiAnalyticsUtil.java
com/huawei/hms/support/hianalytics/a.java
com/huawei/hms/framework/common/PackageUtils.java
com/huawei/hianalytics/ab/bc/ef/bc.java
com/huawei/hms/api/HuaweiApiClientImpl.java
com/huawei/hms/framework/common/BuildConfig.java
com/huawei/hianalytics/ab/bc/de/de.java
com/huawei/hms/api/HuaweiApiAvailability.java
com/huawei/hms/common/PackageConstants.java
Medium
CVSS:0
This app listens to Clipboard changes. Some malwares also listen to Clipboard changes.
MASVS: MSTG-PLATFORM-4
Files:
 e/a/e0.java
Info
CVSS:0
This App uses SafetyNet API.
MASVS: MSTG-RESILIENCE-7
Files:
 e/a/a0/u/h.java
e/a/p2/m.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 e/a/x/b/i.java
e/a/f/a/i/q.java
e/k/d/w/r/c.java
k2/z/u.java
n2/x/e.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 e/a/d/a/g/w0.java
e/a/d/a/a/l/a/b/a.java
com/tenor/android/core/constant/StringConstant.java
com/truecaller/notifications/OTPCopierService.java
e/a/d/a/a/k/b/d/k.java
com/truecaller/insights/ui/qa/view/PdoViewerActivity.java
e/a/h/a/l/c/l.java
e/f/a/a/k0.java
e/a/k4/s0.java
Info
CVSS:0
This app has capabilities to prevent tapjacking attacks.
MASVS: MSTG-PLATFORM-9
Files:
 e/a/d/a/a/q/b/d/b.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 k2/d0/y.java
org/npci/upi/security/pinactivitycomponent/an.java
com/appsflyer/internal/z.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 com/whizdm/okycverificationsdk/ui/activities/BankStatementVerificationActivity.java
e/a/f/a/a/a/a/a/j.java
e/a/f/a/a/p/b/b/c.java
e/f/a/a/k.java
com/whizdm/okycverificationsdk/ui/activities/EMandateActivity.java
High
CVSS:5.4
Remote WebView debugging is enabled.
MASVS: MSTG-RESILIENCE-2
CWE-919 - Weaknesses in Mobile Applications
M1: Improper Platform Usage
Files:
 com/whizdm/okycverificationsdk/ui/activities/BankStatementVerificationActivity.java
com/whizdm/okycverificationsdk/ui/activities/EMandateActivity.java
e/a/c0/a/u1.java
High
CVSS:5.9
This App uses RSA Crypto without OAEP padding. The purpose of the padding scheme is to prevent a number of attacks on RSA that only work when the encryption is performed without padding.
MASVS: MSTG-CRYPTO-3
CWE-780 - Use of RSA Algorithm without OAEP
M5: Insufficient Cryptography
Files:
 com/inmobi/media/hc.java
High
CVSS:7.4
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/mopub/network/CustomSSLSocketFactory.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 e/k/d/n/e/k/g.java
Pygal Germany: 900 Hong Kong: 100 Ireland: 100 India: 200 Netherlands: 200 Sweden: 100 United States: 5400

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Domain config is insecurely configured to permit clear text traffic to these domains in scope.
Scope: ['assets.api.tcpay.in', 'assets.tcpay.in', '127.0.0.1']

Domains analysis

Information computed with MobSF.

US www.truecaller.com 199.36.158.100
US moneyview.in 65.9.61.108
US google.com 142.250.186.142
US www.nokko.com 159.65.75.9
HK www.baidu.com 103.235.46.39
DE px.moatads.com 2.18.235.40
US redirector.gvt1.com 142.250.186.78
US vpa.api.tcpay.in 34.120.29.239
US registration.api.tcpay.in 34.120.29.239
US firebase.google.com 142.250.186.110
US firebase-settings.crashlytics.com 142.250.186.67
US support.google.com 142.250.181.238
IE s3-eu-west-1.amazonaws.com 52.218.61.27
US dl.google.com 172.217.18.110
US blog.truecaller.com 192.0.78.12
US support.truecaller.com 104.21.234.185
IN truecaller.com 35.154.16.28
US privacy.truecaller.com 104.21.234.184
US pagead2.googlesyndication.com 142.250.186.162
SE developer.truecaller.com 192.121.90.212
US oag.ca.gov 167.10.5.181
US maps.googleapis.com 142.250.74.202
US www.googleapis.com