Malicious
36
/65
Threat
Analyzed on 2022-06-13T05:28:48.528884
MD5 | 5f563a38e3b98a7bc6c65555d0ad5cfd | |
SHA1 | 286cb8d883b8eabfd8be0720dcdaa98bb6641f3a | |
SHA256 | 72aa69be5cd46220e1509c040ceb6e3cbb3c676a6c464a811370d688f45f26ec | |
Size | 5.9MB |
Information computed with APKiD.
/tmp/tmp15egcns8!assets/face.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!assets/imo.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!assets/normal.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!assets/snap.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!assets/trueC.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!assets/viber.apk!classes.dex | |
anti_vm |
|
compiler |
|
/tmp/tmp15egcns8!classes.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 98304:PN0DQHNQ75LNFOPezdLHf+b5A/2pPwuowVhW+O/lj0VwJS/SWyT7U/Ya:PN0WNQ75LNFOp5A+JmwVhiZXJf17UQa | |
Manifest | 96:UXU12er/fynSgPKVS0G1RR1//SqK5DsPV70C2yO:UNeDfynSgPKVhSRR13SLeZ2yO | |
classes.dex | 24576:ullEak+M63x1wEx+xxTFY8hB5DJFo3ZcXAXQXUXB0cQ69peIMfBFi:ulSKL3hxg… |
Information computed with Dexofuzzy.
APK file | 384:hFeKnwENt/CYQis4WFfMpNDuTnnjqkW8szYb75Vmu0FDsaCAGjKIuf5OYQZ8H+S:z… | |
classes.dex | 384:hFeKnwENt/CYQis4WFfMpNDuTnnjqkW8szYb75Vmu0FDsaCAGjKIuf5OYQZ8H+S:z… |
Information computed with AndroGuard and Pithus.
Package | com.xiaoo.xii | |
App name | Chat Me | |
Version name | 1.2 | |
Version code | 1 | |
SDK | 17 - 22 | |
UAID | 2944b4e3fbd9caaf1d8aa67eddf8cd8a56d69e15 | |
Signature | Signature V1 | |
Frosting | Not frosted |
Information computed with AndroGuard.
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Certificate valid not before | Feb. 29, 2008, 1:33 a.m. |
Oldest file found in APK | Feb. 29, 2008, 7:33 a.m. |
Latest file found in APK | Feb. 29, 2008, 7:33 a.m. |
First submission on VT | April 24, 2020, 6:15 a.m. |
Last submission on VT | Aug. 27, 2020, 7:29 a.m. |
Upload on Pithus | June 13, 2022, 5:28 a.m. |
Certificate valid not after | July 17, 2035, 1:33 a.m. |
Score | 36/65 |
Report | https://www.virustotal.com/gui/file/72aa69be5cd46220e1509c040ceb6e3cbb3c676a6c464a811370d688f45f26ec/detection |
Provided by VirusTotal
Threat name: ahmyth | Identified 7 times |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
Information computed with MobSF.
Information computed with MobSF.
http://schemas.android.com/apk/res/android Defined in pl/droidsonroids/gif/GifViewUtils.java |
|
http://schemas.android.com/apk/res/android Defined in pl/droidsonroids/gif/GifTextureView.java |
|
http://schemas.android.com/apk/res/android Defined in pl/droidsonroids/gif/GifTextView.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Install other APKs from file |
Confidence:
|
Load class from given class name |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Read file from assets directory |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get location of the device |
Confidence:
|
Method reflection |
Confidence:
|
Get the time of current location |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Read data and put it into a buffer stream |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.