0/58

Threat

com.samsung.android.app.telephonyui

Call settings

Analyzed on 2022-05-27T13:38:13.666515

63

permissions

33

activities

6

services

34

receivers

22

domains

File sums

MD5 6a0c722c91973918f2dfe1eecdb75b70
SHA1 8cbc4804bc2ac0fb55ee6c8c5446da80a1be63cb
SHA256 aaf3bee74e364c97d478a494b83b19014ef2d2447cb54a6d417df27d030b4704
Size 19.87MB

APKiD

Information computed with APKiD.

/tmp/tmpbypc647f!classes.dex
anti_vm
  • Build.MANUFACTURER check
  • SIM operator check
  • network operator name check
compiler
  • dx
/tmp/tmpbypc647f!classes2.dex
anti_vm
  • possible Build.SERIAL check
compiler
  • dx

SSdeep

Information computed with ssdeep.

APK file 196608:SBnARx/L/MDVPtymY+pVQm2r8x0Qux5fikT7mT:SdARixc+pVx2IvmT7mT
Manifest 1536:YZ+RNzhSd65E9RE/4oW0XsnkIVx1cZ+rIVh/qxAsE6eCWwCzCwVI3rZ:e65E9Rx0…
classes.dex 49152:6Ik3Pn0FGuUD+HzDaMwdDHaxacHBnoysU8K62ioYQkQE32I1u1DPOldb4IQ3R28…
classes2.dex 24576:YmH6RzDBwjvP2bnPZq+cFgdp3O/WgKeISTIIppToDX8Z6NcJ101M8:3EBw4c+Kr…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 6144:WnhULHMPAZRf3rrZencWuXw3c80TxNz7DRSvlUBA9+fc20Kudnq+hq:KLP2ep36T…
classes.dex 6144:WnhULHMPAZRf3rrZencWuXw3c80TxNz7DRSvR:KLP2ep36TxNz7D0vR
classes2.dex 1536:OmlorbgCYyWLiN1qha6TD9hofh8G6NZOhY20Kuflnq+yoq:nUEq1RUD9hofhKrOh…

APK details

Information computed with AndroGuard and Pithus.

Package com.samsung.android.app.telephonyui
App name Call settings
Version name 10.1.30.36
Version code 1013000036
SDK 28 - 28
UAID 2843f48e4a60578c3bd3d33ef9b33fc3efbd450e
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Low Broadcast Receiver (com.samsung.android.app.telephonyui.bnr.CallSettingsSmartSwitchReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.kies.calllog.BROADCAST_DETECT
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Content Provider (com.samsung.android.sdk.bixby2.provider.CapsuleProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.scloud.oem.lib.ClientProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.provider.InternalContentProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.preference.CallSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialMainActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialSubActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.tty.UseExternalTtyKeyboardActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.aboutphone.AboutPhoneReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.CALL_PHONE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.emergencymode.EmergencyModeReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.phonenumberlocator.PhoneNumberLocatorNotificationReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.answeringmessages.AnsweringMessageReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.CALL_PHONE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.tty.TtyNotificationReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.samsunganalytics.SamsungAnalyticsReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.callforwarding.CallForwardingReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.messagewaiting.MessageWaitingNotification) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.accessibility.AccessibilityReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.CALL_PHONE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.spamprotection.WhoWhoServiceReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.CALL_PHONE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.spamprotection.SmartCallNotificationReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.ui.blocknumbers.BlockNumbersReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.accessibility.AccessibilitySettingsActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity (com.samsung.android.app.telephonyui.callsettings.ui.callingaccounts.MakeCallsWithDialogActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.callsettings.provider.CallSettingsProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.callsettings.provider.ReminderProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.callsettings.provider.AnswerMemoProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.callsettings.provider.NextiTeleServiceProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.callsettings.model.reset.SoftResetReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.settings.permission.SOFT_RESET [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.samsung.android.app.telephonyui.netsettings.ui.NetSettingsActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.netsettings.ui.multisim.MultiSimMainReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.netsettings.ui.preference.SettingSearchProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.READ_SEARCH_INDEXABLES [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.netsettings.ui.keystringreceiver.KeyStringReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.carrierui.phonevoicerecorder.PhoneVoiceRecorderProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.android.voicemail.impl.fetch.FetchVoicemailReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.android.voicemail.permission.READ_VOICEMAIL [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.android.voicemail.impl.sync.OmtpVvmSyncReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.android.voicemail.permission.READ_VOICEMAIL [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.android.voicemail.impl.sync.VoicemailProviderChangeReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.android.voicemail.impl.OmtpService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_VISUAL_VOICEMAIL_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.android.voicemail.impl.CarrierVvmPackageInstalledReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_VISUAL_VOICEMAIL_SERVICE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.autoreject.AutoRejectManager) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.samsung.android.app.telephonyui.carrierui.networkui.service.RecoveryService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.samsung.android.app.telephonyui.carrierui.networkui.app.AllowDataConnectionDialogActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
Low Activity (com.samsung.android.app.telephonyui.carrierui.networkui.app.NoticeDataConnectionDialogActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.app.telephonyui.permission.NOTICE_USER_ABOUT_DATA_CONNECTION
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.networkui.app.NetworkUiReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.networkui.app.RoamingGuardReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.networkui.app.MDMReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.sec.MDM_ROAMING [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.samsung.android.app.telephonyui.carrierui.photoring.ui.PhotoringScreenActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
Low Activity (com.samsung.android.app.telephonyui.carrierui.photoring.ui.PhotoringScreenActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.phone.permission.READ_CALL_SETTINGS
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Activity (com.samsung.android.app.telephonyui.carrierui.networkui.controller.MobileDataSuspended) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Content Provider (com.samsung.android.app.telephonyui.carrierui.photoring.PhotoringProvider) is not Protected. [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.photoring.model.PhotoringReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.samsung.android.app.telephonyui.carrierui.dcm.VoicemailDialAlertDialog) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.dcm.CancelBlockModeNotification) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.kor.KorEventReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Activity (com.samsung.android.app.telephonyui.carrierui.iccnetwork.IccNetworkLockDialogActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.app.telephonyui.permission.SIM_NETWORK_LOCKED
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.phonenumberlocator.PnlBootBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High TaskAffinity is set for Activity
(com.samsung.android.app.telephonyui.carrierui.groupcall.GroupCallActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Activity (com.samsung.android.app.telephonyui.carrierui.groupcall.GroupCallActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.carrierui.restriction.RestrictionServiceReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.samsung.android.app.telephonyui.carrierui.tile.TurnOn5gTileService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.samsung.android.app.telephonyui.emergencydialer.view.EmergencyDialerActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Activity (com.samsung.android.app.telephonyui.emergencydialer.view.callbackmode.EmergencyCallbackModeActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.app.telephonyui.permission.OPEN_EMERGENCY_CALLBACK_MODE_ACTIVITY
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Broadcast Receiver (com.samsung.android.app.telephonyui.emergencydialer.view.EmergencyDialerReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Content Provider (com.samsung.android.app.telephonyui.utils.diagmon.DiagMonMasterLogProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.diagmonagent.permission.PROVIDER [android:exported=true]
A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.samsung.android.app.telephonyui.hiddennetworksetting.MainActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.samsung.android.app.telephonyui.hiddennetworksetting.receiver.NetSettingReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Dailer Code: 232580 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 232580 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 47359 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.samsung.android.app.telephonyui.callsettings.ui.preference.CallSettingsActivity

Hosts: viv.phoneApp

Schemes: callApp://

Activities

Information computed with AndroGuard.

com.samsung.android.app.telephonyui.callsettings.ui.preference.CallSettingsActivity
com.samsung.android.app.telephonyui.callsettings.ui.aboutphone.AboutPhoneActivity
com.samsung.android.app.telephonyui.callsettings.ui.quickdeclinemessages.QuickDeclineMessagesEditActivity
com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialSettingsActivity
com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialMainActivity
com.samsung.android.app.telephonyui.callsettings.ui.roamingautodial.RoamingAutoDialSubActivity
com.samsung.android.app.telephonyui.callsettings.ui.phonenumberlocator.PhoneNumberLocatorLegalInfoActivity
com.samsung.android.app.telephonyui.callsettings.ui.tty.UseExternalTtyKeyboardActivity
com.samsung.android.app.telephonyui.callsettings.ui.ringtonerecommender.RecommendRingtoneDialog
com.samsung.android.app.telephonyui.callsettings.ui.spamprotection.SmartCallPrivacyNoticeActivity
com.samsung.android.app.telephonyui.callsettings.ui.tty.TtyModeDialogActivity
com.samsung.android.app.telephonyui.callsettings.ui.accessibility.AccessibilitySettingsActivity
com.samsung.android.app.telephonyui.callsettings.ui.callbarring.CbCdmaInputPasswordActivity
com.samsung.android.app.telephonyui.callsettings.ui.callingaccounts.MakeCallsWithDialogActivity
com.samsung.android.app.telephonyui.netsettings.ui.NetSettingsActivity
com.samsung.android.app.telephonyui.netsettings.ui.multisim.DsaMainParser
com.samsung.android.app.telephonyui.netsettings.ui.multisim.DsaMain
com.samsung.android.app.telephonyui.netsettings.ui.multisim.DsaPhoneNumber
com.samsung.android.app.telephonyui.netsettings.ui.multisim.DsaSelectSimCard
com.samsung.android.app.telephonyui.carrierui.autoreject.AcceptCallDialogActivity
com.samsung.android.app.telephonyui.carrierui.networkui.app.AllowDataConnectionDialogActivity
com.samsung.android.app.telephonyui.carrierui.networkui.app.TmoDataRoamDialogActivity
com.samsung.android.app.telephonyui.carrierui.networkui.app.NoticeDataConnectionDialogActivity
com.samsung.android.app.telephonyui.carrierui.photoring.ui.PhotoringScreenActivity
com.samsung.android.app.telephonyui.carrierui.photoring.ui.PhotoringPhraseListActivity
com.samsung.android.app.telephonyui.carrierui.photoring.ui.PhotoringPhrasesEditActivity
com.samsung.android.app.telephonyui.carrierui.networkui.controller.MobileDataSuspended
com.samsung.android.app.telephonyui.carrierui.dcm.VoicemailDialAlertDialog
com.samsung.android.app.telephonyui.carrierui.iccnetwork.IccNetworkLockDialogActivity
com.samsung.android.app.telephonyui.carrierui.groupcall.GroupCallActivity
com.samsung.android.app.telephonyui.emergencydialer.view.EmergencyDialerActivity
com.samsung.android.app.telephonyui.emergencydialer.view.callbackmode.EmergencyCallbackModeActivity
com.samsung.android.app.telephonyui.hiddennetworksetting.MainActivity

Receivers

Information computed with AndroGuard.

com.samsung.android.app.telephonyui.bnr.CallSettingsSmartSwitchReceiver
com.samsung.android.app.telephonyui.callsettings.ui.aboutphone.AboutPhoneReceiver
com.samsung.android.app.telephonyui.callsettings.ui.emergencymode.EmergencyModeReceiver
com.samsung.android.app.telephonyui.callsettings.ui.phonenumberlocator.PhoneNumberLocatorNotificationReceiver
com.samsung.android.app.telephonyui.callsettings.ui.answeringmessages.AnsweringMessageReceiver
com.samsung.android.app.telephonyui.callsettings.ui.tty.TtyNotificationReceiver
com.samsung.android.app.telephonyui.callsettings.ui.samsunganalytics.SamsungAnalyticsReceiver
com.samsung.android.app.telephonyui.callsettings.ui.callforwarding.CallForwardingReceiver
com.samsung.android.app.telephonyui.callsettings.ui.messagewaiting.MessageWaitingNotification
com.samsung.android.app.telephonyui.callsettings.ui.accessibility.AccessibilityReceiver
com.samsung.android.app.telephonyui.callsettings.ui.spamprotection.WhoWhoServiceReceiver
com.samsung.android.app.telephonyui.callsettings.ui.spamprotection.SmartCallNotificationReceiver
com.samsung.android.app.telephonyui.callsettings.ui.blocknumbers.BlockNumbersReceiver
com.samsung.android.app.telephonyui.callsettings.model.reset.SoftResetReceiver
com.samsung.android.app.telephonyui.netsettings.ui.multisim.MultiSimMainReceiver
com.samsung.android.app.telephonyui.netsettings.ui.keystringreceiver.KeyStringReceiver
com.android.voicemail.impl.sms.OmtpMessageReceiver
com.android.voicemail.impl.VoicemailClientReceiver
com.android.voicemail.impl.fetch.FetchVoicemailReceiver
com.android.voicemail.impl.sync.OmtpVvmSyncReceiver
com.android.voicemail.impl.sync.VoicemailProviderChangeReceiver
com.android.voicemail.impl.scheduling.TaskReceiver
com.android.voicemail.impl.CarrierVvmPackageInstalledReceiver
com.samsung.android.app.telephonyui.carrierui.autoreject.AutoRejectManager
com.samsung.android.app.telephonyui.carrierui.networkui.app.NetworkUiReceiver
com.samsung.android.app.telephonyui.carrierui.networkui.app.RoamingGuardReceiver
com.samsung.android.app.telephonyui.carrierui.networkui.app.MDMReceiver
com.samsung.android.app.telephonyui.carrierui.photoring.model.PhotoringReceiver
com.samsung.android.app.telephonyui.carrierui.dcm.CancelBlockModeNotification
com.samsung.android.app.telephonyui.carrierui.kor.KorEventReceiver
com.samsung.android.app.telephonyui.carrierui.phonenumberlocator.PnlBootBroadcastReceiver
com.samsung.android.app.telephonyui.carrierui.restriction.RestrictionServiceReceiver
com.samsung.android.app.telephonyui.emergencydialer.view.EmergencyDialerReceiver
com.samsung.android.app.telephonyui.hiddennetworksetting.receiver.NetSettingReceiver

Services

Information computed with AndroGuard.

com.android.voicemail.impl.scheduling.TaskSchedulerJobService
com.android.voicemail.impl.StatusCheckJobService
com.android.voicemail.impl.DeviceProvisionedJobService
com.android.voicemail.impl.OmtpService
com.samsung.android.app.telephonyui.carrierui.networkui.service.RecoveryService
com.samsung.android.app.telephonyui.carrierui.tile.TurnOn5gTileService

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT April 27, 2021, 4:10 a.m.
Last submission on VT April 27, 2021, 4:10 a.m.
Upload on Pithus May 27, 2022, 1:38 p.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['microphone', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['call lists', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(3)
FCS_CKM.1.2(3)
A password/passphrase shall perform [Password-based Key Derivation Functions] in accordance with a specified cryptographic algorithm..
Password Conditioning
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FCS_CKM.1.1(2) The application shall generate symmetric cryptographic keys using a Random Bit Generator as specified in FCS_RBG_EXT.1 and specified cryptographic key sizes 128 bit or 256 bit.
Cryptographic Symmetric Key Generation

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/caverock/androidsvg/SVGParser.java
com/samsung/android/app/telephonyui/utils/c/b.java
com/sec/ims/scab/CABManager.java
com/sec/ims/settings/ImsProfile.java
com/samsung/android/app/telephonyui/hiddennetworksetting/d/c.java
com/sec/android/diagmonagent/log/provider/DiagMonUtil.java
com/samsung/android/app/telephonyui/netsettings/ui/preference/concrete/cz.java
com/sec/ims/ImsManager.java
com/caverock/androidsvg/SimpleAssetResolver.java
com/samsung/android/app/telephonyui/carrierui/networkui/controller/t.java
com/sec/ims/util/SipError.java
com/samsung/android/scloud/oem/lib/LOG.java
com/samsung/android/app/telephonyui/hiddennetworksetting/d/d.java
com/samsung/context/sdk/samsunganalytics/internal/util/Debug.java
com/samsung/context/sdk/samsunganalytics/internal/sender/buffering/database/DbManager.java
com/sec/ims/settings/GlobalSettings.java
com/samsung/android/app/telephonyui/carrierui/groupcall/n.java
com/sec/android/td/math_lib/math/MATRIX.java
com/altamirasoft/path_animation/PathLineAnimationView.java
com/samsung/android/app/telephonyui/hiddennetworksetting/receiver/NetSettingReceiver.java
com/samsung/android/app/telephonyui/hiddennetworksetting/a/d.java
com/sec/ims/options/CapabilityListener.java
com/caverock/androidsvg/CSSParser.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/a/c.java
com/samsung/android/app/telephonyui/carrierui/groupcall/a/c.java
com/sec/ims/options/Capabilities.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/dl.java
com/sec/ims/settings/ImsProfileLoader.java
com/samsung/android/app/telephonyui/callsettings/ui/aboutphone/AboutPhoneReceiver.java
com/sec/epdg/EpdgManager.java
com/samsung/android/app/telephonyui/hiddennetworksetting/c/h.java
com/samsung/android/app/telephonyui/utils/e/a.java
com/caverock/androidsvg/SVGImageView.java
com/sec/ims/extensions/WiFiManagerExt.java
com/samsung/android/app/telephonyui/emergencydialer/view/callbackmode/fragment/drageventbutton/CircleDragButton.java
com/altamirasoft/path_animation/SvgHelper.java
com/sec/ims/extensions/ServiceStateExt.java
com/samsung/android/app/telephonyui/utils/diagmon/c.java
com/samsung/android/app/telephonyui/netsettings/ui/preference/concrete/VolteCallPreference.java
com/sec/android/gradient_color_extractor/CallGradient_V2.java
com/sec/ims/options/CapabilityManager.java
com/sec/android/diagmonagent/log/provider/DiagMonConfig.java
com/samsung/android/app/telephonyui/hiddennetworksetting/d/f.java
com/sec/ims/util/ImsUri.java
com/sec/android/diagmonagent/log/provider/DiagMonBinderService.java
com/sec/ims/settings/RcsConfigurationReader.java
com/samsung/android/app/telephonyui/hiddennetworksetting/d/a.java
com/samsung/android/app/telephonyui/carrierui/groupcall/k.java
com/sec/android/td/utils/BitmapHelper.java
com/samsung/android/app/telephonyui/carrierui/groupcall/GroupCallActivity.java
com/caverock/androidsvg/SVGAndroidRenderer.java
com/samsung/android/app/telephonyui/hiddennetworksetting/c/a.java
com/samsung/android/app/telephonyui/hiddennetworksetting/b/a.java
com/samsung/android/app/telephonyui/hiddennetworksetting/b/b.java
com/sec/ims/util/TelUri.java
com/sec/ims/extensions/ReflectionUtils.java
com/samsung/android/app/telephonyui/carrierui/groupcall/r.java
com/samsung/android/app/telephonyui/carrierui/networkui/a/b.java
com/samsung/android/settings/search/provider/SearchIndexablesProvider.java
com/samsung/android/app/telephonyui/hiddennetworksetting/d/e.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/extensionlineservicesettings/a.java
com/caverock/androidsvg/SVG.java
com/samsung/android/sdk/bixby2/LogUtil.java
com/sec/ims/IMSUserProfile.java
com/sec/android/diagmonagent/log/provider/DiagMonSDK.java
com/samsung/android/app/telephonyui/hiddennetworksetting/a/c.java
com/samsung/android/app/telephonyui/hiddennetworksetting/c/f.java
com/samsung/android/app/telephonyui/carrierui/networkui/controller/f.java
com/samsung/android/app/telephonyui/carrierui/groupcall/a/a.java
com/sec/android/diagmonagent/log/provider/IssueBuilder.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 com/samsung/android/app/telephonyui/carrierui/photoring/model/l.java
com/samsung/android/scloud/oem/lib/backup/ReuseDBHelper.java
com/samsung/android/app/telephonyui/callsettings/provider/a/i.java
com/samsung/android/app/telephonyui/callsettings/provider/a/m.java
com/samsung/android/app/telephonyui/callsettings/provider/a/l.java
com/samsung/android/app/telephonyui/callsettings/provider/a/d.java
com/samsung/android/app/telephonyui/callsettings/provider/a/j.java
com/samsung/android/app/telephonyui/callsettings/provider/a/b.java
com/samsung/android/app/telephonyui/callsettings/provider/a/g.java
com/samsung/android/app/telephonyui/callsettings/provider/a/h.java
com/samsung/android/app/telephonyui/callsettings/provider/a/e.java
com/samsung/android/app/telephonyui/carrierui/autoreject/provider/a.java
com/samsung/context/sdk/samsunganalytics/internal/sender/buffering/database/DbManager.java
com/samsung/android/app/telephonyui/callsettings/provider/a/a.java
com/samsung/context/sdk/samsunganalytics/internal/sender/buffering/database/DefaultDBOpenHelper.java
com/samsung/android/app/telephonyui/callsettings/provider/a/f.java
com/samsung/android/app/telephonyui/callsettings/provider/a/c.java
com/samsung/android/app/telephonyui/callsettings/provider/a/k.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/samsung/android/app/telephonyui/carrierui/phonevoicerecorder/p.java
com/samsung/android/app/telephonyui/carrierui/photoring/model/t.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/extensionlineservicesettings/a.java
com/sec/android/td/utils/BitmapHelper.java
com/samsung/android/app/telephonyui/carrierui/photoring/model/a/f.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/answeringmessagesettings/AutoAnswerWithMessagePreference.java
com/samsung/android/app/telephonyui/utils/d/e.java
com/samsung/android/app/telephonyui/utils/f/b.java
com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/extensionlineservicesettings/k.java
com/samsung/android/app/telephonyui/carrierui/photoring/model/q.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/samsung/context/sdk/samsunganalytics/internal/security/CertificateManager.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/samsung/android/app/telephonyui/utils/d/b.java
com/samsung/android/scloud/oem/lib/utils/FileTool.java
com/samsung/android/scloud/oem/lib/utils/HashUtil.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/sec/android/td/math_lib/math/MathUtils.java
High
CVSS:7.4
The App uses the encryption mode CBC with PKCS5/PKCS7 padding. This configuration is vulnerable to padding oracle attacks.
MASVS: MSTG-CRYPTO-3
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
M5: Insufficient Cryptography
Files:
 com/samsung/android/app/telephonyui/carrierui/photoring/model/a/a.java
com/samsung/android/app/telephonyui/bnr/c/a.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/samsung/android/app/telephonyui/bnr/c/a.java
com/samsung/android/scloud/oem/lib/utils/SCloudUtil.java
Medium
CVSS:7.4
Files may contain hardcoded sensitive information like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/samsung/android/scloud/oem/lib/common/CommonConstants.java
com/samsung/android/scloud/oem/lib/sync/record/RecordSyncManager.java
com/samsung/android/settings/search/provider/SearchIndexablesContract.java
com/samsung/android/scloud/oem/lib/backup/ReuseDBHelper.java
com/samsung/android/scloud/oem/lib/sync/SyncClientHelper.java
Pygal China: 100 Germany: 200 United Kingdom: 100 Ireland: 100 Korea, Republic of: 100 Netherlands: 100 Poland: 100 United States: 1000

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US regi.di.atlas.samsung.com 34.102.190.55
US www.w3.org 128.30.52.100
CN cn-ms.samsungapps.com 54.222.175.67
US hiya.com 75.2.70.75
US www.firstnet.com 96.16.141.115
US dc.di.atlas.samsung.com 34.120.24.208
DE www.qq.com 23.32.58.214
JP cs.kddi.com 27.86.13.209
GB www.claro.com.br 93.184.219.242
US www.claro.com.ar 13.226.39.122
schemas.android.com
US about.att.com 69.192.161.120
IE vas.samsungapps.com 52.209.34.147
US xmlpull.org 74.50.61.58
xiazai.samsungmobile.com.cn
KR www.kt.com 14.63.149.119
PL www.orange.pl 80.48.169.1
JP support2.smt.docomo.ne.jp 49.102.154.187
DE www.sprint.com 23.205.235.216
US xml.org 104.239.240.11
US stg-api.di.atlas.samsung.com 34.149.149.71
NL www.cricketwireless.com 23.36.163.236

URL analysis

Information computed with MobSF.

http://www.w3.org/TR/SVG11/feature#
http://www.w3.org/2000/svg
http://www.w3.org/1999/xlink
http://xml.org/sax/properties/lexical-handler
Defined in com/caverock/androidsvg/SVGParser.java
http://www.w3.org/TR/SVG11/feature#
http://www.w3.org/2000/svg
http://www.w3.org/1999/xlink
http://xml.org/sax/properties/lexical-handler
Defined in com/caverock/androidsvg/SVGParser.java
http://www.w3.org/TR/SVG11/feature#
http://www.w3.org/2000/svg
http://www.w3.org/1999/xlink
http://xml.org/sax/properties/lexical-handler
Defined in com/caverock/androidsvg/SVGParser.java
http://www.w3.org/TR/SVG11/feature#
http://www.w3.org/2000/svg
http://www.w3.org/1999/xlink
http://xml.org/sax/properties/lexical-handler
Defined in com/caverock/androidsvg/SVGParser.java
https://stg-api.di.atlas.samsung.com
https://regi.di.atlas.samsung.com
https://dc.di.atlas.samsung.com
Defined in com/samsung/context/sdk/samsunganalytics/internal/connection/Domain.java
https://stg-api.di.atlas.samsung.com
https://regi.di.atlas.samsung.com
https://dc.di.atlas.samsung.com
Defined in com/samsung/context/sdk/samsunganalytics/internal/connection/Domain.java
https://stg-api.di.atlas.samsung.com
https://regi.di.atlas.samsung.com
https://dc.di.atlas.samsung.com
Defined in com/samsung/context/sdk/samsunganalytics/internal/connection/Domain.java
https://www.firstnet.com/marketing/index.html#/marketing/index/privacy-policy
https://www.cricketwireless.com/privacy
https://about.att.com/sites/privacy_policy
Defined in com/samsung/android/app/telephonyui/netsettings/ui/preference/c/a.java
https://www.firstnet.com/marketing/index.html#/marketing/index/privacy-policy
https://www.cricketwireless.com/privacy
https://about.att.com/sites/privacy_policy
Defined in com/samsung/android/app/telephonyui/netsettings/ui/preference/c/a.java
https://www.firstnet.com/marketing/index.html#/marketing/index/privacy-policy
https://www.cricketwireless.com/privacy
https://about.att.com/sites/privacy_policy
Defined in com/samsung/android/app/telephonyui/netsettings/ui/preference/c/a.java
https://vas.samsungapps.com/stub/stubUpdateCheck.as
https://cn-ms.samsungapps.com/getCNVasURL.as
http://xmlpull.org/v1/doc/features.html#process-namespaces
Defined in com/samsung/android/app/telephonyui/utils/f/f.java
https://vas.samsungapps.com/stub/stubUpdateCheck.as
https://cn-ms.samsungapps.com/getCNVasURL.as
http://xmlpull.org/v1/doc/features.html#process-namespaces
Defined in com/samsung/android/app/telephonyui/utils/f/f.java
https://vas.samsungapps.com/stub/stubUpdateCheck.as
https://cn-ms.samsungapps.com/getCNVasURL.as
http://xmlpull.org/v1/doc/features.html#process-namespaces
Defined in com/samsung/android/app/telephonyui/utils/f/f.java
http://xmlpull.org/v1/doc/features.html#process-namespaces
Defined in com/samsung/android/app/telephonyui/utils/f/b.java
http://www.sprint.com/internationalroaming
Defined in com/samsung/android/app/telephonyui/carrierui/networkui/controller/s.java
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionVersion_CEK.bin
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.zip
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.bin
Defined in com/samsung/android/app/telephonyui/carrierui/phonenumberlocator/c.java
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionVersion_CEK.bin
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.zip
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.bin
Defined in com/samsung/android/app/telephonyui/carrierui/phonenumberlocator/c.java
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionVersion_CEK.bin
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.zip
http://xiazai.samsungmobile.com.cn/number_region/NumberRegionDB_CEK.bin
Defined in com/samsung/android/app/telephonyui/carrierui/phonenumberlocator/c.java
https://hiya.com/ss/smartcall/terms-of-service/2018
https://hiya.com/ss/smartcall/privacy-policy/2018
Defined in com/samsung/android/app/telephonyui/callsettings/ui/spamprotection/SmartCallPrivacyNoticeActivity.java
https://hiya.com/ss/smartcall/terms-of-service/2018
https://hiya.com/ss/smartcall/privacy-policy/2018
Defined in com/samsung/android/app/telephonyui/callsettings/ui/spamprotection/SmartCallPrivacyNoticeActivity.java
http://www.qq.com/privacy.htm
Defined in com/samsung/android/app/telephonyui/callsettings/ui/phonenumberlocator/PhoneNumberLocatorLegalInfoActivity.java
http://schemas.android.com/apk/res/android
Defined in com/samsung/android/app/telephonyui/callsettings/ui/preference/CheckableLinearLayout.java
https://support2.smt.docomo.ne.jp/MeiwakuCusconWeb/meiwaku2/login/auth.htm
Defined in com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/networkservice/nuisancecallblockingservice/AdvancedSettingsPreference.java
https://cs.kddi.com/?bid=cs-cs-mb-0001
Defined in com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/auservice/GoToWebSitePreference.java
http://cs.kddi.com/smt/option/
Defined in com/samsung/android/app/telephonyui/callsettings/ui/preference/concrete/auservice/UseOptionalServicesPreference.java
www.orange.pl/wificalling.
www.kt.com
http://www.claro.com.ar/clarovowifi
http://www.claro.com.br/wifi-calling
www.claro.com.br/wifi-calling
www.kt.com을
http://www.tre.it.
Defined in Android String Resource
www.orange.pl/wificalling.
www.kt.com
http://www.claro.com.ar/clarovowifi
http://www.claro.com.br/wifi-calling
www.claro.com.br/wifi-calling
www.kt.com을
http://www.tre.it.
Defined in Android String Resource
www.orange.pl/wificalling.
www.kt.com
http://www.claro.com.ar/clarovowifi
http://www.claro.com.br/wifi-calling
www.claro.com.br/wifi-calling
www.kt.com을
http://www.tre.it.
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.READ_CONTACTS read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
High android.permission.READ_EXTERNAL_STORAGE read external storage contents
Allows an application to read from external storage.
High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.RECORD_AUDIO record audio
Allows application to access the audio record path.
High android.permission.SEND_SMS send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
High android.permission.READ_CALL_LOG Allows an application to read the user's call log.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.CHANGE_NETWORK_STATE change network connectivity
Allows applications to change network connectivity state.
Low android.permission.MANAGE_OWN_CALLS Allows a calling application which manages it own calls through the self-managed ConnectionService APIs.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Medium android.permission.INTERNAL_SYSTEM_WINDOW display unauthorised windows
Allows the creation of windows that are intended to be used by the internal system user interface. Not for use by common applications.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.
Medium android.permission.CAPTURE_AUDIO_OUTPUT Allows an application to capture audio output.
Medium android.permission.STATUS_BAR disable or modify status bar
Allows application to disable the status bar or add and remove system icons.
Medium android.permission.CALL_PRIVILEGED directly call any phone numbers
Allows the application to call any phone number, including emergency numbers, without your intervention. Malicious applications may place unnecessary and illegal calls to emergency services.
com.samsung.android.settings.permission.ACCESS_EPISODE Unknown permission
Unknown permission from android reference
com.samsung.android.scloud.backup.lib.read Unknown permission
Unknown permission from android reference
com.samsung.android.scloud.backup.lib.write Unknown permission
Unknown permission from android reference
android.permission.INTERACT_ACROSS_USERS Unknown permission
Unknown permission from android reference
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference
com.sec.android.providers.iwlansettings.permission.WRITE_IWLANSETTINGS Unknown permission
Unknown permission from android reference
com.sec.android.providers.iwlansettings.permission.READ_IWLANSETTINGS Unknown permission
Unknown permission from android reference
com.samsung.android.dialer.permission.CALL_LOG_PICKER Unknown permission
Unknown permission from android reference
com.samsung.contacts.permission.CONTACT_SETTINGS_PROVIDER_WRITE Unknown permission
Unknown permission from android reference
com.sec.android.phone.permission.READ_INTERNAL_CALL_SETTINGS Unknown permission
Unknown permission from android reference
com.sec.android.phone.permission.WRITE_INTERNAL_CALL_SETTINGS Unknown permission
Unknown permission from android reference
com.sec.imsservice.PERMISSION Unknown permission
Unknown permission from android reference
com.sec.imsservice.READ_IMS_PERMISSION Unknown permission
Unknown permission from android reference
com.samsung.android.app.telephonyui.permission.READ_SETTINGS_PROVIDER Unknown permission
Unknown permission from android reference
com.samsung.android.app.telephonyui.permission.WRITE_SETTINGS_PROVIDER Unknown permission
Unknown permission from android reference
com.samsung.android.unifiedwfc.VOWIFI_PROVISIONING_PERMISSION Unknown permission
Unknown permission from android reference
com.sec.epdg.PERMISSION Unknown permission
Unknown permission from android reference
com.sec.android.settings.permission.SOFT_RESET Unknown permission
Unknown permission from android reference
android.permission.READ_BLOCKED_NUMBERS Unknown permission
Unknown permission from android reference
android.permission.READ_SEARCH_INDEXABLES Unknown permission
Unknown permission from android reference
com.att.iqi.permission.RECEIVE_SERVICE_STATE_CHANGE Unknown permission
Unknown permission from android reference
com.android.settings.permission.PLMNACTION Unknown permission
Unknown permission from android reference
android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME Unknown permission
Unknown permission from android reference
android.permission.WRITE_MEDIA_STORAGE Unknown permission
Unknown permission from android reference
com.android.voicemail.permission.ADD_VOICEMAIL Unknown permission
Unknown permission from android reference
com.android.voicemail.permission.WRITE_VOICEMAIL Unknown permission
Unknown permission from android reference
com.android.voicemail.permission.READ_VOICEMAIL Unknown permission
Unknown permission from android reference
com.sgmc.phonenumberlocatorservice.permission.UPDATE_DB Unknown permission
Unknown permission from android reference
android.permission.BROADCAST_CALLLOG_INFO Unknown permission
Unknown permission from android reference
android.permission.PROCESS_CALLLOG_INFO Unknown permission
Unknown permission from android reference
com.sec.android.phone.permission.BIND_GROUP_CALL_SERVICE Unknown permission
Unknown permission from android reference
com.samsung.android.contacts.permission.READ_EMERGENCY_INFO Unknown permission
Unknown permission from android reference
com.sec.android.app.parser.permission.SERVICE Unknown permission
Unknown permission from android reference
com.samsung.contacts.permission.MY_EMERGENCY_DETAIL Unknown permission
Unknown permission from android reference
com.samsung.contacts.permission.EMERGENCY_GROUP_DETAIL Unknown permission
Unknown permission from android reference
com.samsung.contacts.permission.PICKER_SELECT_GROUP Unknown permission
Unknown permission from android reference
com.samsung.contacts.permission.GROUP_DETAIL Unknown permission
Unknown permission from android reference
com.samsung.android.provider.agifcallprovider.permission.READ_AGIFCALL_PROVIDER Unknown permission
Unknown permission from android reference
com.sec.android.diagmonagent.permission.DIAGMON Unknown permission
Unknown permission from android reference
com.sec.android.diagmonagent.permission.PROVIDER Unknown permission
Unknown permission from android reference
com.sec.spp.permission.TOKEN_c3a7a215b3e58794242968714272028db585e3d2557860d5c5e4fb14a11f… Unknown permission
Unknown permission from android reference
com.sec.android.phone.permission.BIND_INTERNAL_SERVICE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Start another application from current application
Confidence:
100%
Load external class
Confidence:
100%
Query the current data network type
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Connect to a URL and receive input stream from the server
Confidence:
100%
Method reflection
Confidence:
100%
Monitor data identified by a given content URI changes(SMS, MMS, etc.)
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Use absolute path of directory for the output media file path
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Open a file from given absolute path of the file
Confidence:
100%
Put data in cursor to JSON object
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence: