0/61
Threat
Analyzed on 2022-01-25T01:45:22.374936
MD5 | d051558e6e4012c6bca9e9cfd21b6f12 | |
SHA1 | 6d7428bf6e4fbc09508ddc03a537e8c77d1a9e60 | |
SHA256 | 7980535dcbbd43f985677255dd0b74ada75198322d03daa16b6c9760411827e3 | |
Size | 1.38MB |
Information computed with APKiD.
/tmp/tmpb1m69mkb!classes.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes2.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes3.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes4.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes5.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes6.dex | |
compiler |
|
/tmp/tmpb1m69mkb!classes7.dex | |
compiler |
|
Information computed with ssdeep.
APK file | 24576:RFdzDKSUkkgTcr604P72YtVIzdpkq65KHOR97R5/AH0YH2VIJifxfxWZg3v:RFN3dkgTcuNyOMdpUsHY73A7HTifxfxR | |
Manifest | 192:iL+pjKrgSxjBfjGzGyqLgLOpk+CeV2GpqzKEOnRhsPMLLX1acu4AiZVY5yFlkj:ii… | |
classes.dex | 6144:I0eBeNDQea8IqnPTqgzLy8v9PB/JsMntvIcLpXAaa9r7JmvbI23YCKV8AP+jmxUP… | |
classes2.dex | 12:HQSmdUz3dZgl/wzUvqWzL8Ow037134ME91M7qTvfEHi6iYJExSdEsiskJ:HcSdSwAv… | |
classes3.dex | 96:1qruf6zUL4rMblKuMUC9kwrYqUsROVQiT:1qKfj41nNR0/ | |
classes4.dex | 3072:Je4cgNH+2YhGKtEsDhQnMara7Zp5EMw3clH/YO/sNyzwRRuyOLDb/A4/dm1Y2NjM… | |
classes5.dex | 12288:3Q/BBGxXOvUG2VydMmAcNq3pf/9rwWYdMhkX1AYz9:YBhS2WYhXr | |
classes6.dex | 6144:52IkJryQFJg/+zbvU9Bvo6YPdkh+EhMZKCMWDCA:52vyUJNUeBCA | |
classes7.dex | 6144:FB8Xu+ibNTIztIlOnQtEInwJrDVIDsnUd19y:Fp+sSzUt13d19y |
Information computed with Dexofuzzy.
Information computed with AndroGuard and Pithus.
Package | com.osp.app.signin | |
App name | Samsung account | |
Version name | 4.0.00.2 | |
Version code | 400002000 | |
SDK | 23 - 23 | |
UAID | 57bb1db71fe55d5587e7e6aa009c12248216d002 | |
Signature | Signature V1 | |
Frosting | Not frosted |
Information computed with AndroGuard.
Information computed with MobSF.
High | Activity (com.osp.app.signin.AccountView) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.osp.app.signin.ReceiveMarketingActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.osp.app.signin.UserValidateCheck) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Service (com.msc.sa.service.RequestService) is not Protected.An intent-filter exists. A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Service is explicitly exported. |
High | Broadcast Receiver (com.osp.app.signin.MigrationEventReceiver) is not Protected. [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 1980, midnight |
Certificate valid not before | Aug. 30, 2011, 10:25 a.m. |
Latest file found in APK | Sept. 18, 2019, 2:35 p.m. |
First submission on VT | Nov. 1, 2019, 1:44 a.m. |
Last submission on VT | Dec. 16, 2020, 5:28 p.m. |
Upload on Pithus | Jan. 25, 2022, 1:45 a.m. |
Certificate valid not after | Aug. 6, 2111, 10:25 a.m. |
Score | 0/61 |
Report | https://www.virustotal.com/gui/file/7980535dcbbd43f985677255dd0b74ada75198322d03daa16b6c9760411827e3/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application invoke platform-provided DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to no hardware resources. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has no network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
FCS_RBG_EXT.2.1 FCS_RBG_EXT.2.2 |
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate. Random Bit Generation from Application |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
Information computed with MobSF.
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Method reflection |
Confidence:
|
Load class from given class name |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get location of the device |
Confidence:
|
Query the IMEI number |
Confidence:
|
Method reflection |
Confidence:
|
Get the time of current location |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.