1/64
Threat
Analyzed on 2022-06-19T16:26:15.124149
MD5 | 4789d187487a9db01a03e8c2fac1b087 | |
SHA1 | 9e54e9943c242fa72ef3708c44ad8d8a213c8a84 | |
SHA256 | 8b6647a08d46abe97701c3ed46710325ca68828c8f042b6ac0feb88e89c33597 | |
Size | 0.06MB |
Information computed with APKiD.
/tmp/tmpipz1sg94!classes.dex | |
yara_issue |
|
compiler |
|
Information computed with ssdeep.
APK file | 768:5OHrC4gWTMuhZpBv56jYNUpvcFAoClTf+b7EQn9szoKk/kjNU1exZ0:5ICbWTMk7pupvcFFdb7HszHkqxi | |
Manifest | 96:UMFByhUeJsS0CUOppyiUg63kTXzSiJL65DA+0gO0kbEJJohI+V:UMLS0CUOnyiUg60… | |
classes.dex | 768:IOHrC4gWTMuhZpBv56jYNUpvcFAoClTf+b7EQn9szoKk/kjp:IICbWTMk7pupvcFF… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
High | Broadcast Receiver (.IntentFilterVerificationReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_INTENT_FILTER_VERIFIER [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Certificate valid not before | Feb. 29, 2008, 1:33 a.m. |
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
First submission on VT | Feb. 8, 2021, 3:14 p.m. |
Last submission on VT | Feb. 8, 2021, 3:14 p.m. |
Upload on Pithus | June 19, 2022, 4:26 p.m. |
Certificate valid not after | July 17, 2035, 1:33 a.m. |
Score | 1/64 |
Report | https://www.virustotal.com/gui/file/8b6647a08d46abe97701c3ed46710325ca68828c8f042b6ac0feb88e89c33597/detection |
Information computed with MobSF.
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(2) | The application perform cryptographic hashing services in accordance with a specified cryptographic algorithm SHA-1/SHA-256/SHA-384/SHA-512 and message digest sizes 160/256/384/512 bits. Cryptographic Operation - Hashing |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Information computed by Pithus.