Threat level
Analyzed on 2021-12-09T08:12:06.731982
MD5 | 5576c469cce941a22908c53aef33306b | |
SHA1 | 6b6cfaf2dd9f8526c3914606180a9019cc4eecd7 | |
SHA256 | 9e61eb18b411e4e171bd548f0c52db526d5fe61834fe09dfe35c4a69cac29381 | |
Size | 0.54MB |
Information computed with APKiD.
/tmp/tmpl7hgjwe3!classes.dex | |
yara_issue |
|
compiler |
|
Information computed with ssdeep.
APK file | 12288:+x+XBwCO/A4gigs+g3/jSC7iUMk6ieo8XhRSO4vAZ:USwL1giv+g3/jSC7iUMk63rXuO4vM | |
Manifest | 192:OCrKsq9Y2pLMLAQi38ilHPTfAXvQFoWcKVzpO06Kpm5SfqBxJmEJf:OCrKsq9Y2pL… | |
classes.dex | 6144:9+PkrDykmZBw47d7OpWqAmVRgiNxkdf3aM4Rb+g3/jSC7iUMk6i3TdIQxLOP:9x+… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Broadcast Receiver (com.guanhong.guanhongpcb.StartReceiver) is not Protected.An intent-filter exists. A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported. |
High | Broadcast Receiver (com.guanhong.guanhongpcb.MediaMountReceiver) is not Protected.An intent-filter exists. A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported. |
High | Dailer Code: 555666 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['location', 'bluetooth', 'camera', 'microphone']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has no network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
Information computed with MobSF.
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Query the IMEI number |
Confidence:
|
Method reflection |
Confidence:
|
Use absolute path of directory for the output media file path |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Method reflection |
Confidence:
|
Query WiFi information and WiFi Mac Address |
Confidence:
|
Check the list of currently running applications |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Get the current WIFI information |
Confidence:
|
Query the IMEI number |
Confidence:
|
Get the current WiFi MAC address |
Information computed with MobSF.
Information computed by Pithus.