0/61
Threat
Analyzed on 2021-11-10T06:32:58.324249
MD5 | 6702a7466f65ce9a5925c190f47a479a | |
SHA1 | beeba4b44f1ae88c6cc7642d42fe83fc56e69b73 | |
SHA256 | c1b586dac351f1aefd34c9cab3c9a8caee67aa74e4fb0df2b3ebd692a55b8519 | |
Size | 3.39MB |
Information computed with APKiD.
/tmp/tmphoihuf98!classes.dex | |
yara_issue |
|
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 49152:aKmW1U2NHcANa5yiS/oj75oMDR1qVpaY6VSt:zFSWa5bR1qVp5SSt | |
Manifest | 768:YcgSAsF8tcKfM2tn3i+M/6B3pndA4OE5ngc1G2lalixQ8rYNt43h4xuS5V+X5wsK:… | |
classes.dex | 24576:z8on68l2enYttXSu1N+5O+R7gLIwNIxUj3jM5PZh:AVfttXSu1AUj3g5z |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Findings | Files |
---|---|
Certificate/Key files hardcoded inside the app. |
SEC-INF/buildConfirm.crt |
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup] flag is missing. The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
Low | Broadcast Receiver (com.sec.android.app.hwmoduletest.HwModuleTestBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.sec.android.app.lcdtest.permission.KEYSTRINGprotectionLevel: signatureOrSystem [android:exported=true] A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device. |
Low | Activity (com.sec.android.app.hwmoduletest.HwModuleTest) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.sec.android.app.lcdtest.permission.KEYSTRINGprotectionLevel: signatureOrSystem [android:exported=true] An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device. |
High | Dailer Code: 0* Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: 43788731 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: 43788732 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
High | Dailer Code: 0437 Found [android:scheme="android_secret_code"] A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
Certificate valid not before | June 22, 2011, 12:25 p.m. |
First submission on VT | April 27, 2021, 3:56 a.m. |
Last submission on VT | April 27, 2021, 3:56 a.m. |
Upload on Pithus | Nov. 10, 2021, 6:32 a.m. |
Certificate valid not after | Nov. 7, 2038, 12:25 p.m. |
Score | 0/61 |
Report | https://www.virustotal.com/gui/file/c1b586dac351f1aefd34c9cab3c9a8caee67aa74e4fb0df2b3ebd692a55b8519/detection |
Information computed with MobSF.
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['location', 'bluetooth', 'camera']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has no network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(1) | The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit. Cryptographic Operation - Encryption/Decryption |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
http://xmlpull.org/v1/doc/features.html#indent-output Defined in com/goodix/cap/fingerprint/ext/GoodixFpsUserState.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Modify voice volume |
Confidence:
|
Method reflection |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get calendar information |
Confidence:
|
Get location of the device |
Confidence:
|
Method reflection |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Open a file from given absolute path of the file |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Initialize class object dynamically |
Information computed with MobSF.
Information computed by Pithus.